CN104221347A - Mobile device supporting multiple access control clients and corresponding method - Google Patents
Mobile device supporting multiple access control clients and corresponding method Download PDFInfo
- Publication number
- CN104221347A CN104221347A CN201380019098.9A CN201380019098A CN104221347A CN 104221347 A CN104221347 A CN 104221347A CN 201380019098 A CN201380019098 A CN 201380019098A CN 104221347 A CN104221347 A CN 104221347A
- Authority
- CN
- China
- Prior art keywords
- access control
- euicc
- esim
- clients
- electronic access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
Abstract
Description
优先权priority
本专利申请要求2013年2月14日与本专利申请同时提交的名称为“METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OFELECTRONIC ACCESS CLIENTS”的美国专利申请13/767,593的优先权,该专利申请要求2012年2月14日提交的名称为“METHODS ANDAPPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONICACCESS CLIENTS”的美国临时专利申请61/598,819的优先权,在此通过引用将上述每个申请全文并入本文。This patent application claims priority to U.S. Patent Application 13/767,593, entitled "METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OFELECTRONIC ACCESS CLIENTS," filed concurrently with this patent application on February 14, 2013, which claims February 2012 Priority to U.S. Provisional Patent Application 61/598,819, filed on the 14th, entitled "METHODS ANDAPPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONICACCESS CLIENTS," each of which is hereby incorporated by reference in its entirety.
相关专利申请Related Patent Applications
本专利申请涉及2012年4月26日提交的名称为“ELECTRONICACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS”的共同拥有且共同未决的美国专利申请13/457,333;2012年5月4日提交的名称为“METHODS AND APPARATUS FOR PROVIDING MANAGEMENTCAPABILITIES FOR ACCESS CONTROL CLIENTS”的美国专利申请13/464,677;2011年4月27日提交的名称为“APPARATUS ANDMETHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESSCLIENTS”的美国专利申请13/095,716;2011年4月5日提交的名称为“APPARATUS AND METHODS FOR CONTROLLING DISTRIBUTION OFELECTRONIC ACCESS CLIENTS”的美国专利申请13/080,558;2010年11月22日提交的名称为“WIRELESS NETWORK AUTHENTICATIONAPPARATUS AND METHODS”的美国专利申请12/952,082;2010年11月22日提交的名称为“METHODS FOR PROVISIONING SUBSCRIBERIDENTITY DATA IN A WIRELESS NETWORK”的美国专利申请12/952,089;2011年7月14日提交的名称为“VIRTUAL SUBSCRIBERIDENTITY MODULE DISTRIBUTION SYSTEM”的美国专利申请13/183,023;2009年1月13日提交的名称为“POSTPONED CARRIERCONFIGURATION”的美国专利申请12/353,227;2011年4月25日提交的名称为“APPARATUS AND METHODS FOR STORING ELECTRONICACCESS CLIENTS”的美国专利申请13/093,722;2011年5月17日提交的名称为“METHODS AND APPARATUS FOR ACCESS CONTROL CLIENTASSISTED ROAMING”的美国专利申请13/109,851;2011年4月4日提交的名称为“MANAGEMENT SYSTEMS FOR MULTIPLE ACCESSCONTROL ENTITIES”的美国专利申请13/079,614;2011年5月19日提交的名称为“METHODS AND APPARATUS FOR DELIVERINGELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESSNETWORK”的美国专利申请13/111,801;2011年4月5日提交的名称为“METHODS AND APPARATUS FOR STORAGE AND EXECUTION OFACCESS CONTROL CLIENTS”的美国专利申请13/080,521;2011年4月1日提交的名称为“ACCESS DATA PROVISIONING APPARATUS ANDMETHODS”的美国专利申请13/078,811;2011年11月2日提交的名称为“METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROMA MALFUNCTIONING DEVICE”的美国专利申请13/287,874;2011年4月5日提交的名称为“SIMULACRUM OF PHYSICAL SECURITY DEVICEAND METHODS”的美国专利申请13/080,533;以及2011年11月11日提交的名称为“APPARATUS AND METHODS FOR RECORDATION OFDEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATION”的美国专利申请13/294,631,在此通过引用将上述每个申请全文并入本文。This patent application is related to commonly owned and co-pending U.S. Patent Application 13/457,333, filed April 26, 2012, entitled "ELECTRONICACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS"; US Patent Application 13/464,677 for APPARATUS FOR PROVIDING MANAGEMENTCAPABILITIES FOR ACCESS CONTROL CLIENTS; US Patent Application 13/095,716 for APPARATUS ANDMETHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESS CLIENTS, filed April 27, 2011; U.S. patent application 13/080,558 entitled "APPARATUS AND METHODS FOR CONTROLLING DISTRIBUTION OFELECTRONIC ACCESS CLIENTS" filed on November 22, 2010, entitled "WIRELESS NETWORK AUTHENTICATION APPARATUS AND METHODS"; U.S. Patent Application 12/952,089, filed on November 22, 2011, entitled "METHODS FOR PROVISIONING SUBSCRIBERIDENTITY DATA IN A WIRELESS NETWORK"; /183,023; U.S. Patent Application 12/353,227, filed January 13, 2009, entitled "POSTPONED CARRIER CONFIGURATION"; U.S. Patent Application 13/, filed April 25, 2011, entitled "APPARATUS AND METHODS FOR STORING ELECTRONICACCESS CLIENTS" 093,722; US Patent Application 13/109,851, filed May 17, 2011, entitled "METHODS AND APPARATUS FOR ACCESS CONTROL CLIENTASSISTED ROAMING"; 20 U.S. Patent Application 13/079,614, filed 4/4/11, entitled "MANAGEMENT SYSTEMS FOR MULTIPLE ACCESS CONTROL ENTITIES"; Patent Application 13/111,801; U.S. Patent Application 13/080,521, filed April 5, 2011, entitled "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OFACCESS CONTROL CLIENTS"; filed April 1, 2011, entitled "ACCESS DATA PROVISIONING APPARATUS ANDMETHODS"; US Patent Application 13/287,874, filed November 2, 2011, entitled "METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROMA MALFUNCTIONING DEVICE"; filed April 5, 2011 U.S. Patent Application 13/080,533 for "SIMULACRUM OF PHYSICAL SECURITY DEVICEAND METHODS"; and U.S. Patent Application 4,13/29 for "APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATION," filed November 11, 2011, Each of the aforementioned applications is hereby incorporated by reference in its entirety.
背景技术Background technique
1.技术领域1. Technical field
本公开整体涉及无线通信和数据网络领域。更具体地讲,本发明特别涉及用于大规模分发电子访问控制客户端的方法与装置。This disclosure relates generally to the fields of wireless communications and data networking. More particularly, the present invention relates to methods and apparatus for mass distribution of electronic access control clients.
2.相关领域2. Related fields
在最新的无线电设备通信系统中需要访问控制来实现安全通信。例如,一种简单的访问控制方案可以包括:(i)验证通信方的身份;以及(ii)授予与被验证身份相称的访问水平。在示例性蜂窝系统(如通用移动电信系统(UMTS))的语境中,访问控制受到访问控制客户端的管控,访问控制客户端称为通用用户身份模块(USIM),在物理通用集成电路卡(UICC)(也称为“SIM卡”)上执行。USIM访问控制客户端认证UMTS蜂窝网络的用户。在成功认证之后,允许用户访问蜂窝网络。如下文中使用的,术语“访问控制客户端”一般是指实现于硬件或软件中,适于控制第一设备访问网络的逻辑实体。访问控制客户端的常见实例包括上述USIM、CDMA用户身份模块(CSIM)、IP多媒体服务身份模块(ISIM)、用户身份模块(SIM)、可移除用户身份模块(RUIM)等。Access control is required in the latest radio communication systems to enable secure communication. For example, a simple access control scheme could include: (i) verifying the identity of communicating parties; and (ii) granting a level of access commensurate with the authenticated identity. In the context of an exemplary cellular system, such as the Universal Mobile Telecommunications System (UMTS), access control is governed by an access control client, called a Universal Subscriber Identity Module (USIM), on a physical Universal Integrated Circuit Card (USIM). UICC) (also known as "SIM card"). The USIM Access Control Client authenticates users of the UMTS cellular network. After successful authentication, the user is allowed to access the cellular network. As used hereinafter, the term "access control client" generally refers to a logical entity implemented in hardware or software and adapted to control a first device's access to a network. Common examples of access control clients include the aforementioned USIM, CDMA Subscriber Identity Module (CSIM), IP Multimedia Services Identity Module (ISIM), Subscriber Identity Module (SIM), Removable Subscriber Identity Module (RUIM), etc.
以前基于SIM卡的方法会遭受若干无法奏效的情况。例如,传统的UICC仅支持单个USIM(或更一般地“SIM”)访问控制客户端。如果用户希望利用不同的SIM认证到蜂窝网络,用户必须用不同的SIM卡物理地交换设备中的SIM卡。一些设备已经被设计为同时容纳两个SIM卡(双SIM电话);不过,这样的双SIM电话未解决SIM卡设备的根本物理限制问题。例如,不能容易地将一个SIM卡之内存储的信息与另一个SIM卡之内存储的信息合并。现有的双SIM设备不能同时访问两个SIM卡的内容。Previous SIM-based approaches suffered from several failures. For example, conventional UICCs only support a single USIM (or more generally "SIM") access control client. If a user wishes to authenticate to the cellular network with a different SIM, the user must physically swap the SIM card in the device with a different SIM card. Some devices have been designed to accommodate two SIM cards simultaneously (dual SIM phones); however, such dual SIM phones do not address the fundamental physical limitations of SIM card devices. For example, information stored within one SIM card cannot easily be merged with information stored within another SIM card. Existing dual SIM devices cannot access the contents of both SIM cards at the same time.
此外,访问SIM卡需要用户花费大量时间;在SIM卡之间切换以传送信息是不合需要的,在传统和双SIM设备中都存在此情况。Furthermore, accessing the SIM cards takes a significant amount of time for the user; switching between SIM cards to transfer information is undesirable, as is the case in both legacy and dual SIM devices.
此外,现有的SIM卡发行者和激活实体一般是特定于网络的,对于不同网络中的不同用户不是普遍存在的。具体地讲,给定网络之内的给定用户必须要从被授权发放SIM的非常特定的实体激活其电话或获得替换用SIM卡。这可能极大地限制用户迅速获得有效访问权的能力,诸如在跨其他网络漫游、交换其电话等时。Furthermore, existing SIM card issuers and activation entities are generally network-specific and not universal to different users in different networks. Specifically, a given user within a given network must either activate his phone or obtain a replacement SIM card from a very specific entity authorized to issue SIMs. This can greatly limit a user's ability to quickly gain valid access, such as when roaming across other networks, swapping their phones, and the like.
最近,已经由诸如其受让人开发出电子SIM(所谓的eSIM)。这些电子SIM在与另一eSIM换出、传送到另一设备等方面提供了增强的灵活性。然而,用于分发和激活SIM的现有网络基础结构没有跟上这些发展的步伐。More recently, electronic SIMs (so-called eSIMs) have been developed by, for example, its assignees. These e-SIMs offer enhanced flexibility in swapping out with another eSIM, transferring to another device, etc. However, existing network infrastructure for distributing and activating SIMs has not kept pace with these developments.
因此,需要新的解决方案和基础结构来利用电子访问客户端(如eSIM)提供的增强灵活性并支持其安全且普遍的分发。Therefore, new solutions and infrastructures are required to take advantage of the enhanced flexibility offered by electronic access clients such as eSIMs and support their secure and pervasive distribution.
发明内容Contents of the invention
本公开尤其涉及用于大规模分发电子访问控制客户端。In particular, the present disclosure relates to electronic access control clients for mass distribution.
首先,公开了一种用于大规模分发电子访问控制客户端的方法。在一个示例性实施例中,该方法包括:建立一个或多个电子访问控制客户端的所有权;确定一个或多个电子访问控制客户端是否先前未被复制过;对一个或多个电子访问控制客户端加密以传送到第二设备;以及交换加密的一个或多个电子访问控制客户端。First, a method for mass distribution of electronic access control clients is disclosed. In an exemplary embodiment, the method includes: establishing ownership of one or more electronic access control clients; determining whether the one or more electronic access control clients have not been previously copied; encrypted for transmission to the second device; and exchanging the encrypted one or more electronic access control clients.
还公开了一种用于大规模分发电子访问控制客户端的装置。在一个示例性实施例中,该装置包括:处理器;以及非暂态计算机可读介质,其包括指令,所述指令在由处理器执行时:建立一个或多个电子访问控制客户端的所有权;确定一个或多个电子访问控制客户端是否先前未被复制过;对一个或多个电子访问控制客户端加密以传送到第二设备;以及交换加密的一个或多个电子访问控制客户端。Also disclosed is an apparatus for mass distribution of electronic access control clients. In one exemplary embodiment, the apparatus includes: a processor; and a non-transitory computer-readable medium comprising instructions that, when executed by the processor: establish ownership of one or more electronic access control clients; Determining whether the one or more electronic access control clients have not been previously copied; encrypting the one or more electronic access control clients for transmission to the second device; and exchanging the encrypted one or more electronic access control clients.
还公开了一种用于处理电子访问控制客户端的移动设备。在一个实施例中,该设备包括:被配置为与无线网络通信的无线接口;与接口进行数据通信的处理器;以及与接口进行数据通信的安全元件。在一个变体中,安全元件包括:安全处理器;与安全处理器进行数据通信并存储有多个访问控制客户端的安全存储装置,访问控制客户端能够用于至少向无线网络进行认证;以及与安全处理器进行数据通信的逻辑,该逻辑被配置为存储、访问以及向或从用户移动装置传送多个访问控制客户端;以及用户接口逻辑,其至少与安全元件通信并被配置为使用户移动装置的用户能够选择所存储的多个访问控制客户端之一,并向网络认证该用户移动装置以便能够与网络进行通信。A mobile device for handling electronic access control clients is also disclosed. In one embodiment, the device includes: a wireless interface configured to communicate with a wireless network; a processor in data communication with the interface; and a secure element in data communication with the interface. In one variant, the secure element includes: a secure processor; secure storage in data communication with the secure processor and storing a plurality of access control clients operable to authenticate at least to the wireless network; and logic for data communication by the security processor, the logic configured to store, access, and transmit a plurality of access control clients to or from the user mobile device; and user interface logic, at least in communication with the secure element and configured to enable the user to move A user of the device can select one of the stored plurality of access control clients and authenticate the user mobile device to the network to be able to communicate with the network.
还公开了一种无线系统。A wireless system is also disclosed.
此外,公开了一种计算机可读装置。在一个实施例中,该装置包括存储有设置于其上的计算机程序的存储介质,该程序被配置为在被执行时:分发电子访问控制客户端。Additionally, a computer readable device is disclosed. In one embodiment, the apparatus comprises a storage medium having stored thereon a computer program configured, when executed, to: distribute the electronic access control client.
此外,公开了一种用于提供具有电子访问客户端的无线移动设备的网络架构。在一个实施例中,该架构包括:多个代理人;以及与多个代理人进行数据通信的多个制造商。在一个变体中,给定的用户移动设备能够由代理人中的多个提供服务;并且代理人中的任一个能够从一个或多个制造商订购电子访问客户端。Additionally, a network architecture for providing wireless mobile devices with electronic access clients is disclosed. In one embodiment, the architecture includes: a plurality of agents; and a plurality of manufacturers in data communication with the plurality of agents. In one variation, a given user mobile device can be serviced by more than one of the agents; and any of the agents can order electronic access clients from one or more manufacturers.
还公开了用于向一个或多个移动设备提供电子访问客户端的装置。在一个实施例中,该装置包括:至少一个处理器;以及与至少一个处理器进行数据通信的第一逻辑,第一逻辑被配置为使得装置执行对访问客户端的加密与解密;与至少一个处理器进行数据通信的第二逻辑,第二逻辑被配置为使得装置确保访问客户端不是复制的;以及与至少一个处理器进行数据通信的第三逻辑,第三逻辑被配置为使得装置建立访问客户端的用户的信任、所有权和/或验证的至少一个。Apparatus for providing an electronic access client to one or more mobile devices is also disclosed. In one embodiment, the device includes: at least one processor; and first logic in data communication with the at least one processor, the first logic is configured to cause the device to perform encryption and decryption of the access client; and at least one processing second logic in data communication with the at least one processor, the second logic configured to cause the device to ensure that the access client is not duplicated; and third logic in data communication with at least one processor, the third logic configured to cause the device to establish the access client at least one of trust, ownership and/or verification of the end user.
还公开了一种电子访问控制客户端撤消过程。在一个实施例中,该过程包括:确定颁发证书的签署证书管理机构是否受影响,证书与存储证书的一个或多个设备相关联;在创建对证书的初始请求时,在一个或多个设备处确定创建的证书服务请求;利用所确定的证书服务请求请求新的证书;以及基于请求颁发新的证书。在一个变体中,一个或多个设备能够使用先前使用的私钥作为请求的一部分,颁发包含与先前私钥对应的先前公钥的新的证书。An electronic access control client revocation procedure is also disclosed. In one embodiment, the process includes: determining whether a signing certificate authority that issued a certificate is affected, the certificate is associated with one or more devices storing the certificate; The created certificate service request is determined at; a new certificate is requested using the determined certificate service request; and a new certificate is issued based on the request. In one variant, one or more devices can issue a new certificate containing a previous public key corresponding to the previous private key, using the previously used private key as part of the request.
本领域的普通技术人员参考如下附图和示例性实施例的详细描述将会立即认识到本公开的其他特征和优点。Other features and advantages of the present disclosure will be immediately appreciated by those of ordinary skill in the art with reference to the following drawings and detailed description of the exemplary embodiments.
附图说明Description of drawings
图1是可结合本公开各方面使用的一种示例性电子通用集成电路卡(eUICC)的逻辑框图。FIG. 1 is a logical block diagram of an exemplary electronic universal integrated circuit card (eUICC) that may be used in conjunction with aspects of the present disclosure.
图2是可结合本公开各方面使用的一种示例性电子用户身份模块(eSIM)目录结构的逻辑框图。2 is a logical block diagram of an exemplary electronic subscriber identity module (eSIM) directory structure that may be used in conjunction with aspects of the present disclosure.
图3是表示可结合本公开各方面使用的用于用户身份模块(SIM)专用文件(SDF)的一种示例性状态机的逻辑框图。3 is a logical block diagram representing an exemplary state machine for a subscriber identity module (SIM) specific file (SDF) that may be used in conjunction with aspects of the present disclosure.
图4是表示可结合本公开各方面使用的用于eSIM操作的一种示例性状态机的逻辑框图。4 is a logical block diagram representing an exemplary state machine for eSIM operation that may be used in conjunction with aspects of the present disclosure.
图5是可结合本公开各种实施例使用的一种示例性eSIM代理人网络的图示。5 is an illustration of an exemplary eSIM proxy network that may be used in conjunction with various embodiments of the present disclosure.
图6是可结合本公开各种实施例使用的一种示例性分层安全协议的逻辑框图。Figure 6 is a logic block diagram of an exemplary layered security protocol that may be used in conjunction with various embodiments of the present disclosure.
图7是可结合本公开各方面使用的包括三(3)部分的一种示例性数据结构的图示。FIG. 7 is a diagram of an exemplary data structure comprising three (3) parts that may be used in conjunction with aspects of the present disclosure.
图8是可结合本公开各方面使用的一种示例性OEM证书层次结构的图示。8 is an illustration of an exemplary OEM certificate hierarchy that may be used in conjunction with aspects of the present disclosure.
图9是示出用于向未个性化的设备传输eSIM的一种示例性逻辑序列的逻辑流程图。9 is a logic flow diagram illustrating one example logical sequence for transferring an eSIM to an unpersonalized device.
图10是示出用于向预个性化的设备传输eSIM的一种示例性逻辑序列的逻辑流程图。10 is a logic flow diagram illustrating one example logical sequence for transferring an eSIM to a pre-personalized device.
图11是示出用于向设备传输一批eSIM的一种示例性逻辑序列的逻辑流程图。11 is a logic flow diagram illustrating one example logical sequence for transferring a batch of eSIMs to a device.
图12是电子通用集成电路卡(eUICC)装置的逻辑表示。Figure 12 is a logical representation of an Electronic Universal Integrated Circuit Card (eUICC) device.
图13是电子用户身份模块(eSIM)仓库装置的逻辑表示。Figure 13 is a logical representation of an Electronic Subscriber Identity Module (eSIM) repository device.
图14是示出一种示例性用户装置的逻辑流程图。Figure 14 is a logic flow diagram illustrating an exemplary user device.
图15是示出用于大规模分发电子访问控制客户端的方法的一个实施例的逻辑流程图。Figure 15 is a logic flow diagram illustrating one embodiment of a method for mass distribution of electronic access control clients.
所有图片版权所有2012-2013Apple Inc.保留所有权利。all pictures Copyright 2012-2013 Apple Inc. All rights reserved.
具体实施方式Detailed ways
现在参考附图,在所有附图中类似标号指代类似部分。Referring now to the drawings, like numerals refer to like parts throughout.
示例性实施例的描述Description of Exemplary Embodiments
现在详细描述本公开的示例性实施例和各方面。尽管主要在GSM、GPRS/EDGE或UMTS蜂窝网络的用户身份模块(SIM)的语境中论述这些实施例和方面,但普通技术人员将认识到,本公开不受这样的限制。实际上,本公开的各个特征能够用于可能受益于向设备存储和分发访问控制客户端的任何网络(无论是无线蜂窝网络还是其他网络)。Exemplary embodiments and aspects of the present disclosure are now described in detail. Although these embodiments and aspects are primarily discussed in the context of a Subscriber Identity Module (SIM) of a GSM, GPRS/EDGE or UMTS cellular network, those of ordinary skill will appreciate that the present disclosure is not so limited. In fact, the various features of the present disclosure can be used with any network (whether wireless cellular or otherwise) that might benefit from storing and distributing access control clients to devices.
如本文所使用的,术语“客户端”和“UE”包括但不限于具有无线功能的蜂窝电话、智能电话(诸如iPhoneTM)、具有无线功能的个人计算机(PC)、诸如手持计算机的移动设备、PDA、个人媒体设备(PMD)、无线平板计算机(诸如iPadTM),所谓的“平板手机”,或以上设备的任意组合。As used herein, the terms "client" and "UE" include, but are not limited to, wireless-enabled cellular phones, smart phones (such as iPhone ™ ), wireless-enabled personal computers (PCs), mobile devices such as handheld computers , PDAs, Personal Media Devices (PMDs), wireless tablet computers (such as iPad (TM ), so-called "phablets", or any combination of the above.
如下文中所使用的,术语“用户身份模块(SIM)”、“电子SIM(eSIM)”、“配置文件”和“访问控制客户端”一般指实现于硬件或软件中,适于控制第一设备访问网络的逻辑实体。访问控制客户端的常见实例包括上述USIM、CDMA用户身份模块(CSIM)、IP多媒体服务身份模块(ISIM)、用户身份模块(SIM)、可移除用户身份模块(RUIM)等或上述的任意组合。As used hereinafter, the terms "subscriber identity module (SIM)", "electronic SIM (eSIM)", "profile" and "access control client" generally refer to an A logical entity that accesses the network. Common examples of access control clients include the aforementioned USIM, CDMA Subscriber Identity Module (CSIM), IP Multimedia Services Identity Module (ISIM), Subscriber Identity Module (SIM), Removable User Identity Module (RUIM), etc. or any combination of the above.
还可以认识到,尽管本文使用术语“用户身份模块”(如eSIM),但此术语并不一定包含或需要(i)由用户自身使用(即,可以由用户或非用户实践本公开的各种特征);(ii)单个个体的身份(即,可以代表一组个体,诸如家庭,或诸如企业的无形或假想实体,实践本公开的各种特征);或(iii)任何有形的“模块”设备或硬件。It can also be appreciated that although the term "subscriber identity module" (e.g., eSIM) is used herein, this term does not necessarily include or require (i) use by the user himself (i.e., the various aspects of the present disclosure may be practiced by the user or non-user). characteristics); (ii) the identity of a single individual (i.e., the various characteristics of the disclosure may be practiced on behalf of a group of individuals, such as a family, or an intangible or imaginary entity such as a business); or (iii) any tangible "module" device or hardware.
示例性eUICC和eSIM操作-Exemplary eUICC and eSIM operation -
现在结合一种示例性具体实施论述本公开的各种特征和功能。在本公开的示例性实施例的语境中,并非如现有技术中那样使用物理UICC,而是将UICC模拟为虚拟或电子实体,例如软件应用程序,下文称为电子通用集成电路卡(eUICC),其包含于UE中的安全元件(如安全微处理器或存储设备)之内。EUICC能够存储和管理多个SIM元件,下文称为电子用户身份模块(eSIM)。每个eSIM都是典型USIM的软件模拟,并且包含类似编程和与其相关联的用户数据。EUICC基于eSIM的ICC-ID选择eSIM。一旦eUICC选择了期望的eSIM,UE就能够发起认证过程以从eSIM的对应网络运营商获得无线网络服务。Various features and functions of the present disclosure are now discussed in connection with an exemplary implementation. In the context of the exemplary embodiments of the present disclosure, rather than using a physical UICC as in the prior art, the UICC is simulated as a virtual or electronic entity, such as a software application, hereinafter referred to as an electronic universal integrated circuit card (eUICC). ), which is contained within a secure element (such as a secure microprocessor or storage device) in the UE. The EUICC is capable of storing and managing multiple SIM elements, hereinafter referred to as Electronic Subscriber Identity Modules (eSIMs). Each eSIM is a software emulation of a typical USIM and contains similar programming and user data associated with it. The EUICC selects an eSIM based on its ICC-ID. Once the eUICC selects the desired eSIM, the UE can initiate an authentication procedure to obtain wireless network services from the eSIM's corresponding network operator.
EUICC软件架构-EUICC Software Architecture -
现在参考图1,示出了可结合本公开使用的一种示例性电子通用集成电路卡(eUICC)。在2011年4月25提交的名称为“APPARATUS ANDMETHODS FOR STORING ELECTRONIC ACCESS CLIENTS”的共同拥有且共同未决的美国专利申请13/093,722中描述了示例性eUICC的实例,前文中通过引用将其全文并入,但要认识到,可以依据本公开使用其他实例。Referring now to FIG. 1 , there is shown an exemplary electronic universal integrated circuit card (eUICC) that may be used in connection with the present disclosure. An example of an exemplary eUICC is described in commonly owned and co-pending U.S. Patent Application 13/093,722, entitled "APPARATUS ANDMETHODS FOR STORING ELECTRONIC ACCESS CLIENTS," filed April 25, 2011, which is incorporated herein by reference in its entirety. input, but it is recognized that other examples may be used in accordance with the present disclosure.
图1示出了一种示例性Java CardTM eUICC架构。用于智能卡应用程序上的操作系统(OS)的其他实例包括(但不限于)MULTOS和专有OS,Java Card仅仅是例示性的。OS提供了应用程序软件和硬件之间的接口。通常,OS包括服务和功能,所述服务和功能被配置用于:输入输出(I/O)、随机存取存储器(RAM)、只读存储器(ROM)、非易失性存储器(NV)(EEPROM,闪存)等。OS还可以提供由更高层使用的密码服务、存储器和文件管理以及通信协议。Figure 1 shows an exemplary Java Card (TM) eUICC architecture. Other examples of operating systems (OS) for use on smart card applications include, but are not limited to, MULTOS and proprietary OSs, Java Card is merely exemplary. OS provides the interface between application software and hardware. Typically, an OS includes services and functions configured for: Input Output (I/O), Random Access Memory (RAM), Read Only Memory (ROM), Non-Volatile Memory (NV) ( EEPROM, flash memory) etc. The OS may also provide cryptographic services, memory and file management, and communication protocols used by higher layers.
示例性Java具体实施由三部分组成:Java Card虚拟机(JCVM)(字节代码解释器);Java Card运行时间环境(JCRE)(其管理卡资源、小应用程序的执行和其他运行时间特征);以及Java应用程序编程接口(API)(一组用于编制智能卡应用程序的定制类)。The exemplary Java implementation consists of three parts: the Java Card Virtual Machine (JCVM) (a byte code interpreter); the Java Card Runtime Environment (JCRE) (which manages card resources, execution of applets, and other runtime features) ; and the Java Application Programming Interface (API) (a set of custom classes for programming smart card applications).
JCVM具有卡上部件(字节代码解释器)和卡外对应物(转换器)。由于卡资源的限制,可以由转换器执行一些编译任务。一开始,Java编译器从源代码创建类文件。转换器对类文件进行预处理并创建CAP文件。转换器验证Java类的加载映像是否形成良好,检查是否有Java card语言子集违规,并且还执行一些其他任务。CAP文件包含Java包中类的可执行二进制表示。转换器还生成导出文件,其包含公共API信息。仅向卡中加载CAP文件。另一种通用的格式是IJC,其可以是从CAP文件转换的。IJC文件的大小可以稍小于CAP文件。The JCVM has an on-card component (byte code interpreter) and an off-card counterpart (converter). Due to card resource limitations, some compilation tasks may be performed by the converter. In the beginning, the Java compiler creates class files from source code. The converter preprocesses the class files and creates CAP files. The converter verifies that the load image of Java classes is well-formed, checks for Java card language subset violations, and performs a number of other tasks as well. CAP files contain executable binary representations of classes in a Java package. The converter also generates an export file, which contains public API information. Only load the CAP file into the card. Another common format is IJC, which can be converted from a CAP file. IJC files can be slightly smaller in size than CAP files.
通常,向卡下载小应用程序需要应用协议数据单元(APDU)的交换,以向卡的持久性存储器中加载CAP文件的内容。卡上安装程序还将CAP文件中的类与卡上的其他类相链接。然后,安装过程创建小应用程序的实例并向JCRE注册该实例。小应用程序在被选择之前保持在暂停状态。Typically, downloading an applet to the card requires an exchange of Application Protocol Data Units (APDUs) to load the contents of the CAP file into the card's persistent memory. The on-card installer also links the classes in the CAP file with other classes on the card. Then, the installation process creates an instance of the applet and registers the instance with the JCRE. The applet remains suspended until selected.
以上过程可以额外地实施一个或多个安全层。在一个示例性实施例中,全局平台(GP)提供安全协议以管理应用程序。GP在安全发行者安全域之内工作,这是卡发行者的卡上表示。卡还可以执行用于例如应用程序提供者的其他安全域。The above process may additionally implement one or more layers of security. In one exemplary embodiment, a global platform (GP) provides security protocols to manage applications. The GP works within the security issuer security domain, which is the on-card representation of the card issuer. The card can also implement other security domains for eg application providers.
在一个示例性实施例中,EUICC是设备的不可移除部件。在工作期间,eUICC执行安全的自举OS。自举OS确保eUICC是安全的,并管理其中安全协议的执行。在2011年4月5日提交的名称为“METHODS ANDAPPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROLCLIENTS”的共同拥有且共同未决的美国专利申请13/080,521中描述了安全自举OS的实例,前文中通过引用将其全文并入。还应当理解,不同的移动网络运营商(MNO)可以定制eSIM以支持各种程度的服务分化。定制的常见实例包括但不限于有专有文件结构和/或软件应用程序。由于eSIM的可配置性,eSIM的尺寸可能变化显著。In one exemplary embodiment, the EUICC is a non-removable part of the device. During operation, the eUICC executes a secure bootstrap OS. The boot OS ensures that the eUICC is secure and manages the execution of security protocols within it. An example of a secure bootstrap OS is described in commonly owned and co-pending U.S. Patent Application 13/080,521, entitled "METHODS ANDAPPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROLCLIENTS," filed April 5, 2011, previously incorporated by reference It is incorporated in its entirety. It should also be understood that different Mobile Network Operators (MNOs) may customize eSIMs to support various degrees of service differentiation. Common examples of customization include, but are not limited to, having proprietary file structures and/or software applications. Due to the configurability of the eSIM, the size of the eSIM may vary significantly.
与现有技术的SIM卡不同的是,eSIM可以根据安全事务在设备之间自由交换。用户不需要“物理卡”来在设备之间移动SIM;然而,eSIM的实际事务必须通过如特定的安全协议得到安全保护。在一个示例性实施例中,在传输之前为特定接收器加密eSIM。在一些变体中,除了加密的内容之外,每个eSIM还可以包括即明文的元数据部分。可以进一步使用加密签名确保明文内容的完整性。可以自由地提供(甚至向不安全实体)此元数据部分,以帮助不安全的存储等。Unlike existing technology SIM cards, eSIMs can be freely swapped between devices based on secure transactions. Users don't need a "physical card" to move a SIM between devices; however, the actual transaction with the eSIM must be securely secured, e.g. through specific security protocols. In one exemplary embodiment, the eSIM is encrypted for a particular receiver prior to transmission. In some variants, each eSIM may include, in addition to the encrypted content, a metadata portion, ie in plaintext. Cryptographic signatures can be further used to ensure the integrity of plaintext content. This metadata section can be freely provided (even to insecure entities) to aid insecure storage etc.
eSIM软件架构-eSIM software architecture-
现在参考图2,公开了一种实现于示例性eUICC中的一种示例性电子用户身份模块(eSIM)目录结构。如图所示,eSIM目录结构已被修改以支持由eSIM提供的灵活性。例如,eSIM目录结构尤其包括:(i)EFeSimDir,其包含已安装eSIM列表;(ii)EFcsn,其包含全局性唯一标识eUECC的卡序号;(iii)DFsecurity,其存储与安全相关的数据和对应于一个或多个eUICC证书的私钥。在一种这样的变体中,DFsecurity信息包括:(i)DFepcf,其包含eUICC平台级PCF;(ii)EFoemcert,其包含根证书和OEM的通用名称(OEM证书可用于诸如工厂整修的特殊操作);(iii)EfeUICCcert,即eUICC的证书;(iv)EFsL1cert,即服务器L1设备的根证书;(v)EFsL2cert,即服务器L2设备的根证书;以及(vi)EFsL3cert,即服务器L3设备的根证书。Referring now to FIG. 2 , an exemplary Electronic Subscriber Identity Module (eSIM) directory structure implemented in an exemplary eUICC is disclosed. As shown, the eSIM directory structure has been modified to support the flexibility provided by eSIM. For example, the eSIM directory structure includes, inter alia: (i) EFeSimDir, which contains a list of installed eSIMs; (ii) EFcsn, which contains a card serial number that globally uniquely identifies eUECC; (iii) DFsecurity, which stores security-related data and corresponding Private keys for one or more eUICC certificates. In one such variant, the DFsecurity information includes: (i) DFepcf, which contains the eUICC platform-level PCF; (ii) EFoemcert, which contains the root certificate and the OEM's common name (OEM certificates can be used for special operations such as factory refurbishment ); (iii) EfeUICCcert, which is the eUICC certificate; (iv) EFsL1cert, which is the root certificate of the server L1 device; (v) EFsL2cert, which is the root certificate of the server L2 device; and (vi) EFsL3cert, which is the root certificate of the server L3 device Certificate.
在一个示例性实施例中,该目录结构还包括包含特定于eSIM的文件结构的SIM专用文件(SDF)。每个SDF都位于MF的正下方。每个SDF都具有名称属性和SID(eSIM ID),诸如集成电路卡标识符(ICCID)。如图所示,每个SDF还包含DFprofiles和DFcodes。此外,在一种变体中,在DFppcf下存储所有与配置文件PCF相关的EF,DFppcf存储于DFprofile下。In an exemplary embodiment, the directory structure also includes a SIM Specific File (SDF) containing an eSIM-specific file structure. Each SDF is located directly below the MF. Each SDF has a name attribute and a SID (eSIM ID), such as an Integrated Circuit Card Identifier (ICCID). As shown, each SDF also contains DFprofiles and DFcodes. Furthermore, in a variant, all EFs related to the profile PCF are stored under DFppcf, which is stored under DFprofile.
在一个示例性实施例中,DFprofile信息包括:(i)EFname,即eSIM的描述(诸如eSIM的名称和版本);(ii)EFtype,其描述eSIM的类型(如普通、自举和测试)。软件应用程序可以使用这一信息,如在使用自举eSIM时显示图标;(iii)EFsys_ver,即支持eSIM所需的eUICC软件的最低版本号;(iv)EFnv_min,其表示eSIM所要求的非易失性存储器的最小量;(v)EFram_min,其表示所要求的易失性存储器的最小量;(vi)EFnv_rsvd,表示为空中事务(OTA)保留的非易失性存储器的量;以及(vii)EFram_rsvd,表示为OTA保留的易失性存储器的量。In an exemplary embodiment, the DFprofile information includes: (i) EFname, which is the description of the eSIM (such as the name and version of the eSIM); (ii) EFtype, which describes the type of the eSIM (such as normal, bootstrap and test). Software applications can use this information, such as displaying icons when using a bootstrapped eSIM; (iii) EFsys_ver, which is the minimum version number of eUICC software required to support eSIM; (iv) EFnv_min, which indicates the non-volatile The minimum amount of volatile memory; (v) EFram_min, which represents the minimum amount of volatile memory required; (vi) EFnv_rsvd, which represents the amount of non-volatile memory reserved for over-the-air transactions (OTA); and (vii ) EFram_rsvd, indicating the amount of volatile memory reserved for OTA.
在一个示例性实施例中,DFcode信息包含一组用于每个eSIM的密钥。在大部分环境下,不能从eUICC读出这些值。一种例外使用情况是导出操作,其通过加密方式包装并导出整个eSIM。由于整个eSIM被加密,因此密钥值保持安全。在一个示例性实施例中,DFcode信息包括:(i)ExEFgPinx/gPukx,其包含全局PIN(个人识别号码)和PUK(PIN解锁密钥);(ii)EFuPin/uPuk包含通用PIN和PUK;(iii)EFadminx包含ADMIN代码;以及(iv)EFotax,其包含OTA代码。在一些变体中,还可以有包含额外元素的ADFusim,诸如:(i)EFk,其存储K,即128位的共享认证密钥;(ii)EFopc,其存储OPc,OPc是从用户密钥和运营商变体算法配置字段OP(一些变体可以存储OP而非OPc)导出的;(iii)EFauthpar,其指定RES的长度;(iv)EFalgid,其指定网络认证算法(例如Milenage);(v)EFsan,其存储SQN;以及(vi)EFlpinx/lpukx,其存储PIN和用于本地PIN的PUK代码。In an exemplary embodiment, the DFcode information contains a set of keys for each eSIM. In most circumstances these values cannot be read from the eUICC. An exceptional use case is the export operation, which encrypts and exports the entire eSIM. Since the entire eSIM is encrypted, the key value remains secure. In an exemplary embodiment, the DFcode information includes: (i) ExEFgPinx/gPukx, which contains a global PIN (Personal Identification Number) and PUK (PIN Unlock Key); (ii) EFuPin/uPuk, which contains a universal PIN and PUK; ( iii) EFadminx, which contains the ADMIN code; and (iv) EFotax, which contains the OTA code. In some variants, there can also be ADFusim containing additional elements, such as: (i) EFk, which stores K, the 128-bit shared authentication key; (ii) EFopc, which stores OPc, which is derived from the user key and the operator variant algorithm configuration field OP (some variants may store OP instead of OPc); (iii) EFauthpar, which specifies the length of the RES; (iv) EFalgid, which specifies the network authentication algorithm (eg Milenage); ( v) EFsan, which stores the SQN; and (vi) EFlpinx/lpukx, which stores the PIN and PUK code for the local PIN.
本领域的普通技术人员阅读本公开应当理解,上述文件、结构或元件仅仅是示例性的,可以用拥有期望功能或结构的其他文件、结构或元件替代。Those of ordinary skill in the art who read this disclosure should understand that the above-mentioned documents, structures or elements are only exemplary, and can be replaced by other documents, structures or elements having desired functions or structures.
现在参考图3,示出了一种用于SDF操作的示例性状态机。如图所示,SDF状态机包括以下状态:CREATION(创建)、INITIALISATION(初始化)、OPERATIONAL(ACTIVATED)(可操作(激活))、OPERATIONAL(DEACTIVATED)(可操作(去活))和TERMINATION(终止)。Referring now to FIG. 3, an exemplary state machine for SDF operation is shown. As shown in the figure, the SDF state machine includes the following states: CREATION (creation), INITIALISATION (initialization), OPERATIONAL (ACTIVATED) (operation (activation)), OPERATIONAL (DEACTIVATED) (operation (deactivation)) and TERMINATION (termination ).
在第一次安装eSIM时,创建SDF(CREATION),然后利用eSIM中包括的文件结构数据进行初始化(INITIALISATION)。一旦安装了eSIM,SDF就过渡到DEACTIVATED状态。在去活状态期间,任何文件都不可用。一旦选择了eSIM,SDF就从DEACTIVATED状态过渡到ACTIVATED状态;ACTIVATED状态使得能够访问SDF的文件。在取消选定eSIM时(暗示或明示),SDF从ACTIVATED状态过渡回DEACTIVATED状态。When installing eSIM for the first time, create SDF (CREATION), and then use the file structure data included in eSIM to initialize (INITIALISATION). Once the eSIM is installed, the SDF transitions to the DEACTIVATED state. During the deactivated state, no files are available. Once the eSIM is selected, the SDF transitions from the DEACTIVATED state to the ACTIVATED state; the ACTIVATED state enables access to the SDF's files. Upon deselection of the eSIM (implicitly or explicitly), the SDF transitions from the ACTIVATED state back to the DEACTIVATED state.
现在参考图4,示出了用于eSIM操作的一种示例性状态机。如图所示,eSIM状态机包括以下状态:INSTALLED(已安装)、SELECTED(选定)、LOCKED(锁定)、DEACTIVATED(去活)、EXPORTED(导出)和DELETED(已删除)。Referring now to FIG. 4, an exemplary state machine for eSIM operation is shown. As shown in the figure, the eSIM state machine includes the following states: INSTALLED (installed), SELECTED (selected), LOCKED (locked), DEACTIVATED (deactivated), EXPORTED (exported) and DELETED (deleted).
在安装eSIM(INSTALLED)期间,在eUICC注册表中为eSIM创建一个条目;该条目表示一个或多个关联的SDF和应用程序。在INSTALLED状态期间,将SDF设置成DEACTIVATED状态,将应用程序设置成INSTALLED状态。During installation of an eSIM (INSTALLED), an entry is created for the eSIM in the eUICC registry; this entry represents one or more associated SDFs and applications. During the INSTALLED state, set the SDF to the DEACTIVATED state and the application to the INSTALLED state.
一旦选择了eSIM,eSIM就过渡到SELECTED状态。在选定的状态期间,SDF过渡到ACTIVATED状态,应用程序过渡到SELECTABLE(可选择)状态。如果取消选定eSIM,eSIM过渡回INSTALLED状态。Once an eSIM is selected, the eSIM transitions to the SELECTED state. During the selected state, the SDF transitions to the ACTIVATED state and the application transitions to the SELECTABLE (selectable) state. If the eSIM is deselected, the eSIM transitions back to the INSTALLED state.
在特定环境下,eSIM可以进入LOCKED状态。例如,如果改变eUICC PCF,使得安装的eSIM不再能够使用,那么eSIM将过渡到LOCKED状态。在LOCKED状态中,将SDF设置成DEACTIVATED状态,将应用程序设置成LOCKED状态。其他杂项状态包括,EXPORTED状态(即,导出eSIM并不再被选择),以及DELETED状态(即,eSIM被删除)。Under certain circumstances, eSIM can enter the LOCKED state. For example, if the eUICC PCF is changed such that the installed eSIM is no longer usable, the eSIM will transition to the LOCKED state. In the LOCKED state, set the SDF to the DEACTIVATED state, and set the application to the LOCKED state. Other miscellaneous states include the EXPORTED state (ie, the eSIM is exported and is no longer selected), and the DELETED state (ie, the eSIM is deleted).
网络认证算法-Network Authentication Algorithm -
网络认证算法(NAA)一般对于移动网络运营商(MNO)的运营而言是强制性的。尽管有不同的NAA实施方式,但功能并非显著不同。在某些实施例中,EUICC可以包括用于NAA的通用包。在eSIM安装期间,可以从预加载的包为每个eSIM创建每个NAA应用程序的实例,以减少eSIM的总加载时间以及eUICC上的不必要的存储器消耗。A Network Authentication Algorithm (NAA) is generally mandatory for the operation of a Mobile Network Operator (MNO). Although there are different NAA implementations, the functions are not significantly different. In some embodiments, the EUICC may include a general package for NAA. During eSIM installation, an instance of each NAA application can be created for each eSIM from a preloaded package to reduce the overall eSIM loading time as well as unnecessary memory consumption on the eUICC.
NAA的常见实例包括但不限于:Milenage、COMP128V1、COMP128V2、COMP128V3和COMP128V4,以及特定的专有算法。有更大数量的专有算法仍在使用中(由于COMP128VI上的已知攻击)。在一个实施例中,网络认证基于公知的认证和密钥协商(AKA)协议。Common examples of NAA include, but are not limited to: Milenage, COMP128V1, COMP128V2, COMP128V3, and COMP128V4, as well as specific proprietary algorithms. There are a larger number of proprietary algorithms still in use (due to known attacks on COMP128VI). In one embodiment, network authentication is based on the well-known Authentication and Key Agreement (AKA) protocol.
在NAA受影响的不同事件中,替换NAA方案可能需要软件更新。在这样的事件期间,如经由安全的软件更新,eSIM可能附带有替换算法。然后,MNO可以经由现有的OTA机制实现替换算法。In different events where NAA is affected, a software update may be required to replace the NAA scheme. During such an event, the eSIM may come with a replacement algorithm, such as via a secure software update. The MNO can then implement the replacement algorithm via existing OTA mechanisms.
示例性eSIM代理人网络-Exemplary eSIM Proxy Network -
图5示出了可结合本公开的各种实施例使用的一种示例性eSIM代理人网络的概要视图。在一个示例性实施例中,代理人网络包括代理人和制造商的分布式网络,使得能够由多个代理人为设备服务,并且代理人可以从多个eSIM制造商订购eSIM。在一些实施例中,可能存在eUICC和/或eSIM配置文件策略,其限制对于特定eSIM操作,设备可以与之通信的该组代理人。例如,MNO可能需要MNO资助的设备仅与MNO自有的代理人通信。Figure 5 shows a schematic view of an exemplary eSIM proxy network that may be used in conjunction with various embodiments of the present disclosure. In one exemplary embodiment, the agent network includes a distributed network of agents and manufacturers such that a device can be serviced by multiple agents and an agent can order eSIMs from multiple eSIM manufacturers. In some embodiments, there may be an eUICC and/or eSIM profile policy that restricts the set of proxies that a device can communicate with for a particular eSIM operation. For example, the MNO may require that MNO-sponsored devices communicate only with MNO-owned proxies.
在一种这样的变体中,主要代理人向设备提供发现服务,使得设备能够识别适当的代理人。然后,该设备能够针对eSIM操作(例如购买、安装、导出和导入)与所识别的代理人直接通信。In one such variation, the primary agent provides a discovery service to the device, enabling the device to identify an appropriate agent. The device is then able to communicate directly with the identified agent for eSIM operations such as purchase, install, export and import.
相关网络领域中普通技术人员将认识到,在运营大规模分发网络期间会出现很多实际问题,诸如图5所示的那样。具体地讲,大规模分发网络必须可缩放,以应对大量的突发提供流量(诸如可能发生于给定移动用户设备的所谓“启动日”)。为了减小总的网络流量而建议的一种方案需要在启动日之前对eSIM(在可能的情况下)进行预个性化。例如,在装运时已经为所谓的“SIM-in”单元分配了eSIM;例如,可以通过利用特定于单元的eUICC的密钥为对应的eSIM配置文件加密,从而为单元对这一预分配的eSIM进行预个性化。Those of ordinary skill in the relevant networking arts will recognize that many practical problems arise during the operation of large-scale distribution networks, such as those illustrated in FIG. 5 . In particular, large-scale distribution networks must be scalable to handle large bursts of provisioning traffic (such as may occur on so-called "start-up days" for a given mobile user device). One approach suggested to reduce overall network traffic requires pre-personalization of the eSIM (where possible) prior to launch day. For example, a so-called "SIM-in" unit has already been assigned an eSIM at the time of shipment; this pre-assigned eSIM can be assigned to a unit, for example, by encrypting the corresponding eSIM profile with a key specific to the eUICC of the unit. Do pre-personalization.
其他考虑事项包括系统可靠性,例如代理人网络必须能够从各种设备故障恢复。一种解决方案是地理冗余,其中跨越不同位置的多个数据中心具有复制的内容;然而,数据中心的网络可以主动彼此同步,以避免eSIM克隆。这样的网络同步会需要非常大量的网络带宽。在另选解决方案中,每个数据中心可以具有一组独立的eSIM;不过,这需要很大的eSIM开销。Other considerations include system reliability, e.g. the agent network must be able to recover from various equipment failures. One solution is geographic redundancy, where multiple data centers across different locations have replicated content; however, the network of data centers can be actively synchronized with each other to avoid eSIM cloning. Such network synchronization can require a very large amount of network bandwidth. In an alternative solution, each data center could have an independent set of eSIMs; however, this requires significant eSIM overhead.
理想情况是,代理网络能够灵活地适应各种业务模型。具体地讲,出于各种法律和反垄断理由,可以由不同方处理上述代理人网络的各个部件。因此,eSIM流量的安全方面需要被认真监测和评估。每个eSIM都包含宝贵的用户和MNO信息。例如,eSIM可以包括共享的认证密钥(用于USIM的K和用于SIM的Ki),如果受到影响,可以将其用于SIM克隆。类似地,eSIM还可以包含可能具有敏感用户数据(诸如银行帐户信息)的应用程序。Ideally, a proxy network would be flexible enough to accommodate various business models. In particular, various components of the agent network described above may be handled by different parties for various legal and antitrust reasons. Therefore, the security aspects of eSIM traffic need to be carefully monitored and evaluated. Each eSIM contains valuable user and MNO information. For example, an eSIM can include a shared authentication key (K for USIM and Ki for SIM) that can be used for SIM cloning if compromised. Similarly, an eSIM can also contain apps that may have sensitive user data such as bank account information.
此外,还应当理解,eUICC软件还需要其他对策用于设备的恢复。与物理SIM不同的是,如果eUICC软件进入不可恢复状态,将需要交换整个设备(这比交换SIM卡成本高得多)。因此,示例性解决方案应当能够处理设备恢复,以便消除这种严厉的措施。Furthermore, it should also be understood that eUICC software also requires other countermeasures for recovery of the device. Unlike a physical SIM, if the eUICC software goes into an unrecoverable state, the entire device will need to be swapped (which is much more costly than swapping a SIM card). Therefore, an exemplary solution should be able to handle device recovery in order to eliminate such drastic measures.
最后,网络操作应当提供“良好的”用户体验。过多的响应时间、不可靠的操作、过多的软件崩溃等,可能会显著降低总体用户体验。Finally, network operations should provide a "good" user experience. Excessive response times, unreliable operation, excessive software crashes, etc., can significantly degrade the overall user experience.
示例性安全协议-Exemplary Security Protocol -
因此,本文公开了一种分层安全软件协议以解决上述各种问题。在一个示例性实施例中,服务器eUICC和客户端eUICC软件包括所谓的软件层的“堆栈”。每个软件层都负责一组分级功能,与其对应的对等软件层协商该功能。此外,每个软件层还与其自身的层通信。还应当理解,在一些情况下,可能会影响(如“越狱”等)设备应用处理器(AP);因此,应当认识到,在客户端eUICC和对应的服务器eUICC(或其他安全实体)之间存在信任关系;即,AP不被信任。Therefore, this paper discloses a layered security software protocol to solve the various problems mentioned above. In an exemplary embodiment, the server eUICC and client eUICC software comprise a so-called "stack" of software layers. Each software layer is responsible for a set of hierarchical functions that it negotiates with its corresponding peer software layer. In addition, each software layer also communicates with its own layer. It should also be understood that in some cases, the device Application Processor (AP) may be affected (eg "jailbroken", etc.); thus, it should be recognized that between the client eUICC and the corresponding server eUICC (or other security entity) A trust relationship exists; that is, the AP is not trusted.
在一个示例性实施例中,公开了一种三(3)层系统。如图6中所示,安全软件协议包括第1层(L1)、第2层(L2)和第3层(L3)。L1安全对eSIM数据执行加密与解密。L1操作限于安全的执行环境(如eUICC或硬件安全模块(HSM))。在L1之内,可以在逻辑L1边界之内以明文(即未加密)存储eSIM数据;在L1边界之外,始终对eSIM数据进行安全地加密。L2安全确保不能复制eSIM。L2边界确保仅有一个eSIM的副本。在L2边界之内,可以存在多个副本。此外,L2安全还可以向加密的eSIM有效载荷中嵌入质询;eSIM的接收人将所接收的质询与安装eSIM之前更早存储的质询比较,以确保其eSIM不会失效(即,是当前唯一的eSIM)。L3安全负责建立信任、所有权和用户的验证。对于每个eSIM,eUICC可以存储信息以表示与eSIM相关联的所有权。In one exemplary embodiment, a three (3) layer system is disclosed. As shown in FIG. 6, the security software protocol includes Layer 1 (L1), Layer 2 (L2) and Layer 3 (L3). L1 security performs encryption and decryption of eSIM data. L1 operations are restricted to secure execution environments (such as eUICCs or hardware security modules (HSMs)). Within L1, eSIM data can be stored in clear text (ie, unencrypted) within the logical L1 boundary; outside the L1 boundary, eSIM data is always securely encrypted. L2 security ensures that the eSIM cannot be duplicated. The L2 boundary ensures that there is only one copy of the eSIM. Within an L2 boundary, multiple replicas can exist. In addition, L2 security can also embed a challenge into the encrypted eSIM payload; the recipient of the eSIM will compare the received challenge with an earlier stored challenge before installing the eSIM to ensure that their eSIM has not expired (i.e. is currently the only one) eSIM). L3 security is responsible for establishing trust, ownership and verification of users. For each eSIM, the eUICC may store information to represent the ownership associated with the eSIM.
在一个示例性具体实施中,所谓的“质询”是用于将特定eSIM实例与eUICC相关联的关键资源。具体地讲,每个eUICC都维护用于每个配置文件代理的特定数量的质询,是维持L2安全的逻辑实体。通过验证质询是有效的,eUICC可以确保eSIM不是失效的eSIM(即,无效的复制品)。针对每个要个性化的eSIM创建多个质询。在接收到匹配的eSIM时,eUICC删除质询。In one exemplary implementation, a so-called "challenge" is a key resource for associating a particular eSIM instance with an eUICC. Specifically, each eUICC maintains a specific number of challenges for each profile agent, which is a logical entity to maintain L2 security. By verifying that the challenge is valid, the eUICC can ensure that the eSIM is not a stale eSIM (ie, an invalid replica). Create multiple challenges for each eSIM to be personalized. On receipt of a matching eSIM, the eUICC deletes the challenge.
考虑以下预个性化情形,eUICC创建(或被给予)多个质询,质询被提供给网络;还在eUICC的非易失性存储器中保存质询。然后接下来,网络能够为绑定到预先生成的质询的eUICC生成eSIM。在设备激活期间eUICC稍后接收eSIM时,eUICC能够验证接收的eSIM是否包含适当的质询。Consider the following pre-personalization scenario, the eUICC creates (or is given) multiple challenges, the challenges are provided to the network; the challenges are also saved in the eUICC's non-volatile memory. Then next, the network can generate an eSIM for the eUICC bound to the pre-generated challenge. When the eUICC receives the eSIM later during device activation, the eUICC is able to verify that the received eSIM contains the appropriate challenge.
然而,上述方案的一个缺点是,固定数量的质询可能容易受到拒绝服务(DOS)攻击的影响。在DOS攻击中,连续触发eUICC以生成质询,直到耗尽其所有质询资源。因此,在一种这样的变体中,eUICC额外执行会话握手,以在处理会触发eUICC创建质询的请求之前认证配置文件服务器/代理。此外,在资源被耗尽且eUICC无法创建新质询的不同情况下,eUICC可以存储一组独立的保留质询,专门指定其以释放另一组质询。在一些情况下,EUICC可以额外地包括原始设备制造商(OEM)凭证,该OEM可以使用此凭证进一步控制质询操作。However, one disadvantage of the above scheme is that the fixed number of challenges may be vulnerable to denial of service (DOS) attacks. In a DOS attack, the eUICC is continuously triggered to generate challenges until all its challenge resources are exhausted. Therefore, in one such variant, the eUICC additionally performs a session handshake to authenticate the profile server/proxy before processing the request that would trigger the eUICC to create a challenge. Furthermore, in different situations where resources are exhausted and the eUICC is unable to create new challenges, the eUICC can store a separate set of reserved challenges, specifically designated to release another set of challenges. In some cases, the EUICC may additionally include original equipment manufacturer (OEM) credentials, which the OEM may use to further control challenge operations.
现在参考图7,示出了一种用于eSIM的示例性数据结构。如图所示,示例性数据结构包括三(3)部分,每部分用于L1、L2和L3安全级别之一。通过将安全部件解耦成不同的层次,可以根据多种选项在多个实体上分配总体网络操作。例如,各种网络实体可以仅执行安全层中的一个或两个(如eSIM供应商可以仅处理L2等);这种灵活性容易且有利地适应几乎任何业务安排。Referring now to FIG. 7, an exemplary data structure for an eSIM is shown. As shown, the exemplary data structure includes three (3) sections, one for each of L1, L2, and L3 security levels. By decoupling security components into different layers, overall network operations can be distributed over multiple entities according to a variety of options. For example, various network entities may implement only one or two of the security layers (e.g. eSIM providers may only handle L2, etc.); this flexibility easily and advantageously adapts to almost any business arrangement.
如图7中所示,因为非对称加密(即,每个实体具有不同且唯一密钥)比对称操作(其中实体共享密钥)慢得多,所以每个eSIM配置文件部分702都利用对称密钥被加密,并利用预定的eSIM接收器的L1公钥对对称密钥进行加密。ESIM还可以包括用于元数据的明文部分(诸如ICCID的文本串)。对加密的对称密钥、元数据和加密的eSIM内容进行散列化,并利用“捐赠”L1实体的公钥进行签署。例如,在末尾附加关联的L1证书,用于进行验证。As shown in FIG. 7, each eSIM profile section 702 utilizes symmetric encryption because asymmetric encryption (i.e., each entity has a different and unique key) is much slower than a symmetric operation (where entities share a key). The key is encrypted and the symmetric key is encrypted with the intended eSIM receiver's L1 public key. The ESIM may also include a plaintext portion (such as a text string of the ICCID) for metadata. The encrypted symmetric key, metadata, and encrypted eSIM content are hashed and signed with the public key of the "donating" L1 entity. For example, append the associated L1 certificate at the end for verification.
图7的批处理描述符部分704包含用于eSIM的L2信息。它具有明文部分,包括全局唯一标识符(GUID)、针对预定eSIM接收器的质询、eSIM接收器的唯一ID、检索配置文件的URL和张贴安装结果的URL。批处理描述符还包括一系列元素的明文部分,该部分由如下内容构成:针对每个配置文件的ICCID和配置文件的散列部分(元数据部分和加密的eSIM内容)。在一个实施例中,散列不包括对称密钥,从而可以创建批处理描述符而无需等待生成实际的配置文件。对于设备侧操作,批处理描述符仅包含一个ICCID和配置文件散列。为了进行服务器到服务器的批传送,期望有更大的阵列。对批处理描述符的数据内容进行散列化并利用L2公钥签署,以及在末尾附加关联的L2证书。Batch descriptor section 704 of FIG. 7 contains L2 information for eSIM. It has a plaintext portion that includes a Globally Unique Identifier (GUID), a challenge to the intended eSIM receiver, the unique ID of the eSIM receiver, a URL to retrieve the configuration file, and a URL to post the installation results. The batch descriptor also includes a plaintext part of a series of elements consisting of the ICCID for each profile and the hashed part of the profile (metadata part and encrypted eSIM content). In one embodiment, the hash does not include a symmetric key so that batch descriptors can be created without waiting for the actual configuration file to be generated. For device-side operations, the batch descriptor contains only an ICCID and profile hash. Larger arrays are desirable for server-to-server batch transfers. The data content of the batch descriptor is hashed and signed with the L2 public key, and the associated L2 certificate is appended at the end.
L3所有者部分706包含用于eSIM的L3信息。主字段标识与eSIM相关联的用户帐户(如abcme.com),服务名标识用户帐户要认证的服务提供者。包括批处理描述符的散列以关联L2和L3数据结构。该数据可以明文形式存储,被散列化并利用L3公钥签署。在末尾附加L3证书。The L3 owner section 706 contains L3 information for the eSIM. The main field identifies the user account associated with the eSIM (such as abcme.com ), and the service name identifies the service provider that the user account is to authenticate. Include hashes of batch descriptors to associate L2 and L3 data structures. This data can be stored in clear text, hashed and signed with an L3 public key. Append the L3 certificate at the end.
如本文使用的,有三(3)种类型的证书:eUICC证书、服务器设备证书和OEM证书。在一个实施例中,受信任第三方为经证实的eUICC发放证书。每个eUICC包含私钥和由此实体或此实体的下级密钥管理机构发放的关联证书。在一些实施例中,一个受信任第三方可以为经证实的L1、L2和L3设备发放证书;或者,独立的第三方实体可以为L1、L2或L3设备发放证书。当存在多个第三方时,eUICC已经预加载(或者从受信任的实体被提供OTA)第三方的根证书管理机构(CA),并可以基于适当的CA验证从服务器设备接收的消息。As used herein, there are three (3) types of certificates: eUICC certificates, server device certificates, and OEM certificates. In one embodiment, a trusted third party issues a certificate for a verified eUICC. Each eUICC contains a private key and an associated certificate issued by this entity or its subordinate key management authority. In some embodiments, a trusted third party may issue certificates for certified L1, L2, and L3 devices; alternatively, an independent third party entity may issue certificates for L1, L2, or L3 devices. When multiple third parties are present, the eUICC has preloaded (or is provided OTA from a trusted entity) root certificate authority (CA) of the third party and can validate messages received from the server device based on the appropriate CA.
现在参考图8,示出了一种示例性OEM证书层次结构。根证书管理机构(CA)具有一组中间CA,其执行任务的子集(如发放例如iOS或相当的设备证书)。如图所示,eUICC CA负责eSIM具体的操作。EUICC CA可以为一组服务器发放证书;如图所示,证书包括如用于eUICC维护的工厂整修服务器和用于签署eUICC PCF的激活服务器。由客户端eUICC使用根CA连同eUICC CA的通用名验证OEM签署的消息。Referring now to FIG. 8, an exemplary OEM certificate hierarchy is shown. A Root Certificate Authority (CA) has a set of intermediate CAs that perform a subset of tasks (such as issuing e.g. iOS or equivalent device certificates). As shown in the figure, eUICC CA is responsible for the specific operation of eSIM. The EUICC CA can issue certificates for a group of servers; as shown in the figure, the certificates include, for example, factory refurbished servers for eUICC maintenance and activation servers for signing eUICC PCF. OEM-signed messages are verified by the client eUICC using the root CA together with the common name of the eUICC CA.
根据上文,在一个示例性实施例中,每个客户端eUICC存储以下安全相关的数据:(i)eUICC证书,用于eUICC L1、L2和L3操作(每个eUICC存储用于L1、L2和L3安全相关操作的证书);(ii)与eUICC证书相关联的eUICC私钥;(iii)OEM证书,包括OEM的根证书和OEMeUICC CA的通用名;(iv)可以证明服务器设备的第三方的根证书。在一些变体中,如果签署CA受到影响,例如,如果eUICC CA或服务器CA受到影响(如私钥受到影响/丢失),可能需要替换eUICC中的证书,下面描述两(2)种撤消过程。Based on the above, in an exemplary embodiment, each client eUICC stores the following security-related data: (i) eUICC certificates for eUICC L1, L2 and L3 operations (each eUICC stores for L1, L2 and certificate for L3 security-related operations); (ii) the eUICC private key associated with the eUICC certificate; (iii) the OEM certificate, including the OEM's root certificate and the common name of the OEMeUICC CA; (iv) the third party's certificate that can certify the server device root certificate. In some variants, if the signing CA is affected, for example, if the eUICC CA or the server CA is affected (e.g. private key is affected/lost), the certificate in the eUICC may need to be replaced, two (2) revocation procedures are described below.
根据第一示例性撤消过程,如果发放eUICC证书的签署CA受到影响,应当交换受影响eUICCs中存储的eUICC证书。具体地讲,在为eUICC创建初始证书请求时,保存证书签署请求(CSR)。如果签署CA受到影响,可以利用初始CSR为eUICC请求新的证书。通过保持相同的CSR,eUICC能够使用相同的私钥,并且将发放包含相同eUICC公钥的新证书。OEM能够利用OEM的私钥签署新的证书。当eUICC向服务器代理人发送请求时,代理人能够检查不良eUICC CA的撤消列表,并拒绝具有特定错误的请求以指示需要交换该证书。AP能够通过现有OEM服务检索新的eUICC证书,并向eUICC发送新的证书(在这种情形中,AP无需受到信任)。According to a first exemplary revocation procedure, if the signing CA that issued the eUICC certificates is affected, the eUICC certificates stored in the affected eUICCs should be exchanged. Specifically, when creating the initial certificate request for the eUICC, save the Certificate Signing Request (CSR). If the signing CA is affected, a new certificate can be requested for the eUICC using the initial CSR. By keeping the same CSR, the eUICC is able to use the same private key and new certificates containing the same eUICC public key will be issued. OEMs are able to sign new certificates using the OEM's private key. When the eUICC sends a request to the server proxy, the proxy is able to check the revocation list of the bad eUICC CA and reject the request with a specific error indicating that the certificate needs to be exchanged. The AP can retrieve the new eUICC certificate through the existing OEM service and send the new certificate to the eUICC (in this case the AP does not need to be trusted).
然后,eUICC验证OEM签名并确保接收到的公钥匹配eUICC中先前存储的公钥。在一些变体中,为了防止拒绝服务(DOS)攻击或重放攻击,eUICC还包括eUICC证书。当发放新证书时,在一种变体中增加该时段。EUICC能够验证,在存储新证书之前,所接收证书中的eUICC时段是否高于当前证书的时段。The eUICC then verifies the OEM signature and ensures that the received public key matches a previously stored public key in the eUICC. In some variants, to prevent denial of service (DOS) attacks or replay attacks, the eUICC also includes an eUICC certificate. In a variant, this period is increased when a new certificate is issued. The EUICC is able to verify that the eUICC period in the received certificate is higher than that of the current certificate before storing the new certificate.
遗憾的是,由于各种eUICC资源约束的原因,撤消eUICC中的服务器证书可能有一定的难度;即,对于eUICC来讲,处理大的撤消列表可能是站不住脚的。为了避免维护撤消列表,在第二撤消方案中,将每个服务器证书额外与一个时段相关联。如果CA受到影响,根CA为所有合法的实体重新发放证书,并增加每个新证书的时段。由于服务器证书的数量将不会很大,因此能够在现有的系统中进行证书的重新发放。在客户端eUICC处,eUICC在非易失性存储器中保存服务器L1、L2和L3证书的预期时段。在所接收的证书包含更高时段时,eUICC必须更新对应的NV时段并拒绝具有更低时段的任何将来证书;即,eUICC将拒绝自从CA受影响以来未被签署的欺诈服务器。在一些变体中,服务器也可以为受影响的eUICC维护eUICC黑名单。在一个实施例中,来自黑名单eUICC的请求被服务器拒绝。Unfortunately, revoking server certificates in the eUICC may be difficult due to various eUICC resource constraints; i.e., it may be untenable for the eUICC to handle large revocation lists. To avoid maintaining a revocation list, in a second revocation scheme, each server certificate is additionally associated with a period. If the CA is compromised, the root CA reissues certificates for all legitimate entities and increases the time period for each new certificate. Since the number of server certificates will not be large, certificate reissuance can be performed in the existing system. At the client eUICC, the eUICC saves the server L1, L2 and L3 certificates in non-volatile memory for the expected period. When a received certificate contains a higher period, the eUICC must update the corresponding NV period and reject any future certificates with a lower period; ie, the eUICC will reject rogue servers that have not been signed since the CA was affected. In some variants, the server may also maintain an eUICC blacklist for affected eUICCs. In one embodiment, requests from blacklisted eUICCs are rejected by the server.
策略控制功能-Policy Control Functions -
在以上安全解决方案的语境之内,有两(2)个层次的策略控制功能(PCF):(i)eUICC平台层次;以及(ii)配置文件层次。在一个示例性实施例中,EUICC PCF可以仅由OEM更新,而配置文件PCF由MNO控制并且是eSIM的一部分。在一种这样的变体中,在导入和/或导出eSIM时,包括配置文件PCF作为导入/导出包的一部分。Within the context of the above security solutions, there are two (2) levels of Policy Control Functions (PCFs): (i) eUICC platform level; and (ii) configuration file level. In an exemplary embodiment, the EUICC PCF may only be updated by the OEM, while the Profile PCF is controlled by the MNO and is part of the eSIM. In one such variant, when importing and/or exporting the eSIM, the configuration file PCF is included as part of the import/export package.
现在参考eUICC PCF,eUICC PCF可以包括:(i)SIM锁定策略,其指定eUICC可以激活的eSIM的类型;(ii)可用于授权删除eUICC中所有eSIM的保密码;(iii)服务器(L1、L2和L3)的通用名列表,其指定eUICC可以通信的服务器设备群集(如基于业务考虑或方法)(即包含性列表);(iv)服务器(L1、L2和L3)的通用名列表,其指定eUICC不可以通信的服务器设备群集(即,排除性列表)。Referring now to the eUICC PCF, the eUICC PCF may include: (i) a SIM lock policy, which specifies the type of eSIM that the eUICC can activate; (ii) a security code that can be used to authorize the deletion of all eSIMs in the eUICC; (iii) a server (L1, L2 and L3) that specify clusters of server devices with which the eUICC can communicate (e.g., based on business considerations or methods) (i.e., an inclusive list); (iv) lists of common names for servers (L1, L2, and L3) that specify A cluster of server devices with which the eUICC may not communicate (ie, an exclusionary list).
类似地,配置文件PCF可以包括:(i)服务器(L1、L2和L3)的通用名列表,其指定eUICC可以导出eSIM的仓库群集(包含性的);(ii)服务器(L1、L2和L3)的通用名列表,其指定eUICC不可以导出eSIM的仓库群集(排除性的);(iii)通知URL和操作类型,指定在完成指定eSIM操作时被发送通知的URL;(iv)自动到期参数,其中一旦配置文件到期,AP就可以删除eSIM;(v)服务器设备(L1、L2和L3)类,可以被分配不同的类,表示实施的安全级别(配置文件可以选择仅与特定等级以上的服务器部件通信);(vi)服务器证书(L1、L2和L3)的时段,在安装期间检查其(例如,如果eUICC服务器证书的时段等于或高于指定时段,eUICC仅安装配置文件);(vii)L3认证可以使用的L3服务名,和/或L3认证不能使用的服务名列表;(viii)eUICC系统的最低版本(其中仅可以在高于指定最低版本的eUICC系统上安装eSIM);(ix)eSIM要求的最小RAM大小(不包括OTA操作);(x)为OTA保留的最小RAM大小;(xi)eSIM要求的最小非易失性(NV)存储器大小(为OTA保存的空间除外);(xii)为OTA保留的最小NV大小。Similarly, a configuration file PCF may include: (i) a list of common names of servers (L1, L2, and L3) specifying warehouse clusters (inclusive) from which eUICCs can export eSIMs; (ii) servers (L1, L2, and L3 ) which specifies the repository clusters from which the eUICC cannot export eSIMs (exclusive); (iii) notification URL and operation type, which specifies the URL to be notified upon completion of the specified eSIM operation; (iv) automatic expiration parameters, where the AP can delete the eSIM once the profile expires; (v) server device (L1, L2, and L3) classes, which can be assigned different classes, denoting the security level implemented (profiles can be selected to be associated only with specific levels server part communication above); (vi) period of server certificate (L1, L2 and L3), which is checked during installation (e.g. eUICC only installs configuration file if period of eUICC server certificate is equal to or higher than specified period); (vii) L3 service names that can be used for L3 authentication, and/or a list of service names that cannot be used for L3 authentication; (viii) the minimum version of the eUICC system (where eSIM can only be installed on eUICC systems higher than the specified minimum version); (ix) Minimum RAM size required by eSIM (excluding OTA operations); (x) Minimum RAM size reserved for OTA; (xi) Minimum non-volatile (NV) memory size required by eSIM (excluding space reserved for OTA ); (xii) Minimum NV size reserved for OTA.
示例性操作-Exemplary operation -
在上述部分(如eUICC、eSIM、代理人网络、安全协议等)的语境之内,公开了以下示例性消息序列。在下文中的序列图中,给出了三个实体:代理人、配置文件代理以及配置文件锁,分别代表负责L3、L2和L1安全的实体。然而,应当理解,这些是逻辑实体,不同的网络拓扑可以包括在内或进一步区分其以上功能。Within the context of the above-mentioned parts (eg, eUICC, eSIM, proxy network, security protocols, etc.), the following exemplary message sequence is disclosed. In the following sequence diagram, three entities are given: agent, configuration file proxy and configuration file lock, representing entities responsible for L3, L2 and L1 security respectively. However, it should be understood that these are logical entities and that different network topologies may include or further differentiate the above functions.
在例示的实施例中,客户端eUICC负责全部三个层级的安全;然而,为了清楚起见,将客户端eUICC分成三个逻辑实体,以在eUICC之内收集功能需求。此外,尽管对于客户端eUICC之内的L1、L2和L3可以有独立的凭证集,但应当理解,可以使用相同(即一份凭证)的凭证,因为客户端设备是单个设备。In the illustrated embodiment, the client eUICC is responsible for all three levels of security; however, for clarity, the client eUICC is divided into three logical entities to gather functional requirements within the eUICC. Furthermore, although there may be separate sets of credentials for L1, L2 and L3 within the client eUICC, it should be understood that the same (ie one credential) credential may be used since the client device is a single device.
eSIM交付,未个性化-eSIM delivered, not personalized -
图9示出了用于向设备交付未个性化的eSIM的一种示例性逻辑序列。首先,设备经由发现过程(未示出)识别服务器代理人。一旦设备尝试与服务器代理人通信,就有三种主要操作:(i)设备向服务器后端查询可用的eSIM选项;(ii)如果被请求的eSIM未被预先个性化,则设备请求服务器对eSIM进行个性化;以及(iii)设备下载实际的eSIM并安装它。Figure 9 illustrates an example logical sequence for delivering an unpersonalized eSIM to a device. First, the device identifies a server proxy via a discovery process (not shown). Once the device attempts to communicate with the server agent, there are three main actions: (i) the device queries the server backend for available eSIM options; (ii) if the requested eSIM has not been pre-personalized, the device requests the server to personalize the eSIM personalization; and (iii) the device downloads the actual eSIM and installs it.
在第一阶段中,设备使用getProfileOptions向服务器后端查询可用的eSIM选项。通过其UniqueId识别与设备相关联的eUICC,UniqueId例如可以是卡序列号。代理人利用销售信息确定设备可用的一个或多个eSIM选项。对于解锁的设备,可能有可用eSIM的非常大的集合;因此,在一些实施例中,显示可能要由用户选择的通用选项(如基于位置、成本等)。服务器返回对于设备而言有效的配置文件提供者(MNO)和配置文件类型(如预付费/后付费)的阵列。In the first phase, the device queries the server backend for available eSIM options using getProfileOptions. The eUICC associated with the device is identified by its UniqueId, which may for example be a card serial number. The sales information is used by the agent to determine one or more eSIM options available for the device. For unlocked devices, there may be a very large set of available eSIMs; thus, in some embodiments, generic options (eg, based on location, cost, etc.) that may be selected by the user are displayed. The server returns an array of profile providers (MNOs) and profile types (eg prepaid/postpaid) valid for the device.
在一些情形下,用户可用的eSIM类型可以被视为保密信息,因此在一些变体中,getProfileOptionsAPI还要求设备eUICC L3签署eUICC的唯一标识符,并包括API中的签署标识符。服务器代理人(或代理人服务器)能够在处理请求之前验证签名。这防止恶意方通过发送伪装的请求检索用户的配置文件选项。在一些变体中,设备代理人和服务器代理人之间的通信使用安全协议(如传输安全(TLS))以防止捕获和重放攻击。In some cases, the eSIM type available to the user may be considered confidential information, so in some variants, the getProfileOptions API also requires the device eUICC L3 to sign the unique identifier of the eUICC and include the signing identifier in the API. The server proxy (or proxy server) is able to verify the signature before processing the request. This prevents malicious parties from retrieving a user's profile options by sending a spoofed request. In some variants, the communication between the device proxy and the server proxy uses a secure protocol such as Transport Security (TLS) to prevent capture and replay attacks.
在一个实施例中,getProfileOptions包含两个L3令牌,以验证eSIM的当前和新所有权。当前的L3令牌可以是唯一标识符或所谓的“虚假卡”刮卡代码。新的L3令牌可以是用于将用户帐户与eSIM相关联的信息,例如,用于iCloud帐户的签字令牌(如设备已登录到用户帐户中以检索令牌)。两个L3令牌都被eUICC L3签署。服务器代理人利用关联的认证服务验证L3令牌。例如,它可以与网络服务器(如受让人的iCloud服务器)或第三方服务通信,以验证签字令牌。In one embodiment, getProfileOptions contains two L3 tokens to verify current and new ownership of the eSIM. Current L3 tokens can be unique identifiers or so-called "fake card" scratch codes. A new L3 token could be information used to associate a user account with an eSIM, for example, a signing token for an iCloud account (as the device has logged into the user account to retrieve the token). Both L3 tokens are signed by eUICC L3. The server proxy validates the L3 token with the associated authentication service. For example, it may communicate with a web server (such as the assignee's iCloud server) or a third-party service to verify signed tokens.
为了优化性能并避免重复认证,在认证设备传递的令牌之后,服务器代理人生成一次性代码(OTC)并将OTC传递回设备。该设备可以使用OTC作为服务器已经执行L3认证的证据。完整的数据二进制大对象(BLOB)可以包括所生成的OTC、唯一的设备标识符(如卡序号(CSN))、委托人、服务提供者和表示OTC有效性的时间戳。BLOB被散列化并由代理人签署。在一个变体中,利用对称密钥执行散列化以改善总体性能。如果getProfileOptions返回eSIM的阵列,则提示用户做出选择。To optimize performance and avoid repeated authentications, after authenticating the token passed by the device, the server agent generates a one-time code (OTC) and passes the OTC back to the device. The device can use the OTC as evidence that the server has performed L3 authentication. A complete data binary large object (BLOB) may include the generated OTC, a unique device identifier such as a card serial number (CSN), principal, service provider, and a timestamp indicating the validity of the OTC. The BLOB is hashed and signed by a proxy. In a variant, the hashing is performed with a symmetric key to improve overall performance. If getProfileOptions returns an array of eSIMs, the user is prompted to make a selection.
在第二阶段,设备会调用personalizeProfile以请求服务器后端对eSIM进行个性化。在设备向服务器发送个性化请求之前,在eUICC配置文件代理和服务器配置文件代理之间存在用于认证的会话握手。设备代理人和eUICC基于用户选择的配置文件选项和服务器代理人发送的当前L3代码和新L3代码创建会话。EUICC能够保存此信息以填充随后接下来发送的配置文件请求。EUICC配置文件代理生成会话id,其将被服务器代理返回,用于随后接下来的认证。In the second stage, the device calls personalizeProfile to request the server backend to personalize the eSIM. There is a session handshake for authentication between the eUICC Profile Proxy and the Server Profile Proxy before the device sends a personalization request to the server. The device agent and eUICC create a session based on the profile options selected by the user and the current L3 code and the new L3 code sent by the server agent. The EUICC is able to save this information to populate subsequent subsequent profile requests. The EUICC profile proxy generates a session id which will be returned by the server proxy for subsequent authentication.
设备代理人现在可以向服务器代理人传递eUICC生成的会话请求。服务器代理人能够检查该请求。例如,服务器代理人确定唯一ID表示的请求eUICC是否有用。由于唯一标识符是以明文形式包括在内的,因此即使由服务器配置文件代理执行更彻底的请求验证,服务器代理人也能够检索该信息。The device agent can now pass eUICC generated session requests to the server agent. The server proxy can inspect the request. For example, the server agent determines whether the requested eUICC represented by the unique ID is useful. Because the unique identifier is included in clear text, server proxies are able to retrieve this information even if more thorough request validation is performed by the server profile proxy.
如果请求适当,那么服务器代理人向配置文件代理传递该请求。配置文件代理通过验证eUICC L2证书并利用eUICC L2公钥验证L2签名,以密码方式验证该请求。一旦通过验证,服务器配置文件代理就创建SessionResponse,其包括明文部分,明文部分包括:所接收的会话标识符和唯一标识符,L2签名(通过对明文部分进行散列化并利用服务器配置文件代理的私钥签名而生成)。If the request is appropriate, the server agent passes the request to the profile agent. The profile agent cryptographically validates the request by validating the eUICC L2 certificate and validating the L2 signature with the eUICC L2 public key. Once authenticated, the Server Profile Agent creates a SessionResponse that includes a plaintext portion including: the received session identifier and unique identifier, an L2 signature (by hashing the plaintext portion and using the Server Profile Agent's generated by private key signature).
从服务器配置文件代理向服务器代理人发送会话响应,然后将会话响应转发到设备代理人。设备代理人在prepareProfileRequest消息中向eUICC传递响应。EUICC L2通过验证服务器配置文件代理的证书和L2签名来验证sessionReponse。EUICC L2还验证会话标识符和唯一标识符是否匹配eUICC中的信息。一旦通过验证,eUICC就创建针对个性化的配置文件请求的质询。质询被提交到非易失性存储器。EUICC然后创建配置文件请求BLOB,包括L1、L2和L3相关的信息。在通过引用并入本文中的附录A中列出了详细的结构。Sends a session response from the server profile proxy to the server proxy, which then forwards the session response to the device proxy. The device agent delivers the response to the eUICC in the prepareProfileRequest message. EUICC L2 verifies the sessionReponse by verifying the server profile proxy's certificate and L2 signature. EUICC L2 also verifies that the session identifier and unique identifier match the information in the eUICC. Once authenticated, the eUICC creates a challenge for the personalized profile request. The challenge is submitted to non-volatile memory. The EUICC then creates a configuration file request BLOB, including L1, L2 and L3 related information. The detailed structure is listed in Appendix A, which is incorporated herein by reference.
然后,将配置文件请求BLOB发送到服务器后端。服务器代理人执行L3验证,并包括要关联eSIM的L3所有者信息(如委托人和服务提供者);服务器配置文件代理创建批处理描述符,服务器配置文件锁为eUICC对eSIM进行个性化。可以将个性化的eSIM分发到内容交付网络(CDN)以进行性能优化。Then, send the profile request BLOB to the server backend. The server agent performs L3 verification and includes the L3 owner information (such as principal and service provider) to be associated with the eSIM; the server profile agent creates a batch descriptor, and the server profile lock personalizes the eSIM for the eUICC. Personalized eSIMs can be distributed to content delivery networks (CDNs) for performance optimization.
在设备代理人接收到配置文件描述符和关联的L3所有者信息之后,它通过提供所接收的GUID(全局唯一标识符)经由getProfile检索关联配置文件。After the device agent receives the profile descriptor and associated L3 owner information, it retrieves the associated profile via getProfile by providing the received GUID (Globally Unique Identifier).
一旦设备代理人检索了配置文件描述符和配置文件,它就指示客户端eUICC安装eSIM。调用流程示出了三个独立的调用,processL3Owner、processProfileDescriptor和installProfile,然而应当理解,在实际实现中,可以在单个事务处理之内组合这三个逻辑调用。EUICC执行L3、L2和L1验证;一旦验证,就安装eSIM。关联的质询被删除。与eSIM一起保存L3所有者信息以指示适当的所有权。如果用户导出eSIM,可以在稍后的点提供L3所有者信息。Once the device agent has retrieved the profile descriptor and profile, it instructs the client eUICC to install the eSIM. The call flow shows three separate calls, processL3Owner, processProfileDescriptor, and installProfile, however it should be understood that in actual implementations these three logical calls could be combined within a single transaction. The EUICC performs L3, L2 and L1 verification; once verified, the eSIM is installed. The associated challenge is deleted. Save L3 owner information with eSIM to indicate proper ownership. L3 owner information can be provided at a later point if the user exports the eSIM.
一旦安装了配置文件,eUICC就向服务器返回安装结果。服务器基础结构能够使用通知触发清除内容交付网络(CDN)中高速缓存的内容。在一些情况下,也可以将此信息用于通知服务,例如,表示成功安装、部分安装、不成功安装等。Once the configuration file is installed, the eUICC returns the installation result to the server. Server infrastructure can use notifications to trigger purge of cached content in a content delivery network (CDN). In some cases, this information can also be used for notification services, for example, to indicate successful installation, partial installation, unsuccessful installation, etc.
ESIM交付,预个性化-ESIM delivery, pre-personalized -
图10示出了用于向预个性化的设备交付eSIM的一种示例性逻辑序列。类似于图9的方案,交付预个性化的eSIM需要三(3)个阶段。Figure 10 illustrates an exemplary logical sequence for delivering an eSIM to a pre-personalized device. Similar to the scheme of Figure 9, three (3) phases are required to deliver a pre-personalized eSIM.
一开始,在制造客户端设备期间,工厂代理人指示eUICC为稍后的eSIM预个性化创建质询。然而,与图9的方案不同的是,该设备尚未与MNO或eSIM类型相关联;相反,这些字段填充有特殊的值,以表示稍后将进行选择。保存配置文件请求BLOB的完整内容用于稍后的个性化使用。Initially, during the manufacture of the client device, the factory agent instructs the eUICC to create a challenge for later eSIM pre-personalization. However, unlike the scheme of Figure 9, the device is not yet associated with an MNO or eSIM type; instead, these fields are filled with special values to indicate that a selection will be made later. Save the full contents of the Profile Request BLOB for later personalization use.
例如,通过发货通知、设备销售等自动触发第二阶段。分发中心中的L2(客户端配置文件代理)充当客户端eUICC L2的代理。尽管eUICC配置文件请求BLOB不包含MNO和eSIM类型,但客户端配置文件代理能够通过用更新的信息替换这些字段来重新生成BLOB。客户端配置文件代理能够创建其自身的质询并替换eUICC质询。客户端配置文件代理将利用其自身的私钥签署内容(否则,所有的L2将都需要唯一的质询)。BLOB将包含eUICC的L1签名,eUICC仍然需要对个性化的eSIM解密。利用现有的personalizeProfile请求向服务器代理人发送新的配置文件请求BLOB。在下文中,该过程与图9的过程没有什么不同。For example, the second phase is automatically triggered by shipping notifications, equipment sales, etc. The L2 (client profile proxy) in the distribution center acts as a proxy for the client eUICC L2. Although the eUICC profile request BLOB does not contain the MNO and eSIM type, the client profile agent is able to regenerate the BLOB by replacing these fields with updated information. The Client Profile Proxy can create its own challenges and replace the eUICC challenges. The Client Profile Proxy will sign the content with its own private key (otherwise, all L2s will require a unique challenge). The BLOB will contain the L1 signature of the eUICC, which still needs to decrypt the personalized eSIM. Send a new profile request BLOB to the server agent using an existing personalizeProfile request. Hereinafter, the process is not different from that of FIG. 9 .
此外,还应当理解,即使MNO想要支持其自己的代理系统,公开的预个性化过程也能够使用相同的接口。服务器代理人将向客户端返回批处理描述符并对eSIM进行个性化。客户端配置文件代理会创建具有eUICC的质询的新批处理描述符,要在eUICC稍后请求配置文件时使用。Furthermore, it should also be understood that the published pre-personalization process can use the same interface even if the MNO wants to support its own proxy system. The server agent will return the batch descriptor to the client and personalize the eSIM. The Client Profile Agent will create a new batch descriptor with the challenge of the eUICC to be used when the eUICC requests the profile later.
最后,在最后阶段中,当用户为设备加电时,设备执行getProfileOptions以检查可用的eSIM选项。由于eSIM已经预先个性化,响应会包括有效的批处理描述符,设备不再需要调用personalizeProfile。它会使用描述符中的信息直接经由getProfile请求检索eSIM。Finally, in the final phase, when the user powers up the device, the device executes getProfileOptions to check for available eSIM options. Since the eSIM is already pre-personalized, the response will include a valid batch descriptor and the device no longer needs to call personalizeProfile. It will use the information in the descriptor to retrieve the eSIM directly via the getProfile request.
eSIM交付,成批交付-eSIM delivery, batch delivery -
图11示出了用于例如在两个实体之间交付大量(批)eSIM的一种示例性逻辑序列。在一个实施例中,客户端代理人和服务器代理人是具有经由例如虚拟专用网络(VPN)的安全通信的安全实体。支持“批处理”使得客户端可以订购大量的eSIM。Figure 11 shows an exemplary logical sequence for delivering a large number (batch) of eSIMs, eg, between two entities. In one embodiment, the client proxy and server proxy are secure entities with secure communication via, for example, a virtual private network (VPN). Support for "batching" allows clients to order large numbers of eSIMs.
在这种情形下,在配置文件代理接收到对配置文件进行个性化的请求时,如果返回批处理描述符,则不需要对配置文件进行个性化;相反,客户端可以在稍后阶段根据需要请求实际配置文件。在批处理描述符操作中,在加密配置文件(利用对称密钥封装)和配置文件元数据上计算配置文件内容的散列,后两者都不需要对配置文件进行个性化。这还不需要L1存储每个eUICC的对称密钥,否则会因为难以满足的额外存储要求而使L1负担加重。在一个实施例中,可以在存储装置之外存储加密的eSIM(利用对称密钥封装)。会利用L1RFS(远程文件系统)密钥封装对称密钥,可以在存储装置之外与加密的eSIM一起保存封装的密钥。In this case, when a request to personalize a profile is received by the profile proxy, if a batch descriptor is returned, the profile does not need to be personalized; instead, the client can Request the actual configuration file. In a batch descriptor operation, a hash of the profile content is computed over the encrypted profile (wrapped with a symmetric key) and the profile metadata, neither of which require personalization of the profile. This also does not require the L1 to store the symmetric key for each eUICC, which would otherwise burden the L1 with difficult to meet additional storage requirements. In one embodiment, an encrypted eSIM (wrapped with a symmetric key) may be stored off-storage. The symmetric key is wrapped with an L1RFS (Remote File System) key, and the wrapped key can be kept outside the storage device with the encrypted eSIM.
eSIM导出-eSIM export -
最后,一旦将eSIM存储到客户端设备,用户就可以选择从设备导出eSIM,稍后将eSIM导入到相同或不同的设备。一个目的是支持eSIM交换。另一个目的是释放eUICC存储器以存储额外的eSIM。在导出时,有三种可能的情形:(i)导出到云;(ii)导出到AP(用于板外存储装置);以及(iii)设备到设备的eSIM传送。类似地,用户可以从云、AP或另一设备导入。Finally, once the eSIM is stored on the client device, the user can choose to export the eSIM from the device and later import the eSIM to the same or a different device. One purpose is to support eSIM swapping. Another purpose is to free up eUICC memory to store additional eSIMs. On export, there are three possible scenarios: (i) export to cloud; (ii) export to AP (for off-board storage); and (iii) device-to-device eSIM transfer. Similarly, users can be imported from the cloud, AP, or another device.
在eSIM安装期间,将用户帐户信息关联到eSIM(除非用户选择退出)。帐户信息包括用于L3认证的充分信息。例如,它可以包括委托人(如x2zyahoo.com)和用于认证的关联服务提供者。如果没有帐户信息与eSIM相关联,用户可以利用其他认证方法导出eSIM。一个这样的实施例包括物理按钮,其安全地连接到eUICC以证明设备的物理占有。在另一个实施例中,每个eSIM包括唯一的密码,用户必须具有密码以证明其所有权。利用OEM凭证是另一选项。During eSIM installation, associate user account information to the eSIM (unless the user opts out). Account information includes sufficient information for L3 authentication. For example, it can include principals (such as x2zyahoo.com) and associated service providers for authentication. If no account information is associated with the eSIM, the user can utilize other authentication methods to export the eSIM. One such embodiment includes a physical button that is securely connected to the eUICC to prove physical possession of the device. In another embodiment, each eSIM includes a unique passcode that users must have to prove their ownership. Utilizing OEM credentials is another option.
在用户导出eSIM时,AP从eUICC检索已安装配置文件的列表;对于每个配置文件,eUICC还返回关联的委托人和为了对抗重放而产生的不重性。在用户选择导出配置文件时,AP使用委托人中包含的信息从服务提供者获得单一签名(SSO)令牌,其中会提示用户为此目的输入用户名和密码。将SSO令牌与委托人和不重性一起传递到导出请求中的服务器代理人。服务器代理人能够利用设备提供的SSO令牌处理对服务提供者的认证。一旦通过认证,流程就对eSIM到设备的交付形成镜像,只是客户端和服务器的角色被颠倒。在高层次上,服务器代理人发起与eUICC的会话,为导出创建请求BLOB。在该请求中,它包括eUICC产生的不重性,表示操作已经通过了L3认证。EUICC验证请求BLOB。利用服务器代理的公钥加密eSIM,创建用于eSIM的批处理描述符和L3所有者信息。可以将eSIM与L3和L2信息一起发送到服务器。When a user exports an eSIM, the AP retrieves a list of installed profiles from the eUICC; for each profile, the eUICC also returns the associated principal and non-heavyness to combat replay. When the user chooses to export the configuration file, the AP uses the information contained in the principal to obtain a Single Signature (SSO) token from the service provider, where the user is prompted for a username and password for this purpose. Pass the SSO token to the server's proxy in the export request, along with the principal and non-heavyness. The server proxy can handle authentication to the service provider using the SSO token provided by the device. Once authenticated, the process mirrors the delivery of the eSIM to the device, except that the roles of client and server are reversed. At a high level, the server agent initiates a session with the eUICC, creating a request BLOB for export. In this request, it includes the non-heavyness generated by the eUICC, indicating that the operation has passed L3 authentication. The EUICC validates the request BLOB. Encrypt eSIM with server agent's public key, create batch descriptor and L3 owner information for eSIM. The eSIM can be sent to the server along with the L3 and L2 information.
一旦eUICC对eSIM加密以进行导出,eUICC就放弃对eSIM的所有权,不再使用eSIM或向任何其他实体导出eSIM。在一些情况下,EUICC可以保存加密的副本以帮助从连接丢失中恢复过来(即,如果加密的eSIM始终未达到服务器)。或者,AP可以在连接失败时保存加密eSIM的副本进行重新传输。服务器可以返回确认,触发AP清理存储的副本。Once the eUICC encrypts the eSIM for export, the eUICC relinquishes ownership of the eSIM and no longer uses the eSIM or exports the eSIM to any other entity. In some cases, the EUICC may keep an encrypted copy to help recover from connection loss (i.e. if the encrypted eSIM never reaches the server). Alternatively, the AP could save a copy of the encrypted eSIM for retransmission if the connection fails. The server can return an acknowledgment, triggering the AP to clean up the stored copy.
在一些实施例中,也可以从门户网站发起导出。如果用户丢失了其设备,他可以使用门户网站从其设备导出eSIM。在这种情况下,门户网站会与设备通信以发起导出操作。流程是相似的,只是用户会使用门户网站而非AP来获得SSO令牌,用于所有权验证。In some embodiments, the export can also be initiated from the portal. If a user loses his device, he can export eSIM from his device using the web portal. In this case, the portal communicates with the device to initiate the export. The process is similar except that the user will use the portal instead of the AP to obtain an SSO token for ownership verification.
装置-device-
现在更详细地描述可结合上述方法使用的各种装置。Various devices that may be used in conjunction with the methods described above are now described in more detail.
eUICC设备-eUICC device-
图12示出了根据本公开的eUICC设备1200的一个示例性实施例。EUICC设备可以包括独立的实体,或者合并其他网络实体,诸如服务器。如图所示,eUICC设备1200一般包括用于与通信网络交接的网络接口1202、处理器1204和一个或多个存储装置1206。网络接口被示为连接到MNO基础结构,以便提供对其他eUICC设备的访问,以及对一个或多个移动设备的直接或间接访问,但可以用其他配置和功能取代。FIG. 12 shows an exemplary embodiment of an eUICC device 1200 according to the present disclosure. EUICC devices may comprise stand-alone entities, or incorporate other network entities, such as servers. As shown, the eUICC device 1200 generally includes a network interface 1202 for interfacing with a communication network, a processor 1204 and one or more storage devices 1206 . The network interface is shown connected to the MNO infrastructure in order to provide access to other eUICC devices, as well as direct or indirect access to one or more mobile devices, but may be substituted with other configurations and functions.
在一种配置中,eUICC设备能够:(i)与另一eUICC(eUICC设备或客户端设备)建立通信;(ii)安全地存储eSIM;(iii)检索安全存储的eSIM;(iv)加密要交付到另一特定eUICC的eSIM;以及(v)向/从eSIM仓库发送多个eSIM。In one configuration, an eUICC device is capable of: (i) establishing communication with another eUICC (eUICC device or client device); (ii) securely storing an eSIM; (iii) retrieving a securely stored eSIM; Delivering an eSIM to another specific eUICC; and (v) sending multiple eSIMs to/from the eSIM depot.
eSIM仓库-eSIM Warehouse -
图13示出了根据本公开的eSIM仓库1300的一个示例性实施例。eSIM仓库1300可以被实现为独立的实体,或者与其他网络实体(如eUICC设备1200等)合并。如图所示,eSIM仓库1300一般包括用于与通信网络交接的网络接口1302、处理器1304和存储装置1306。FIG. 13 illustrates an exemplary embodiment of an eSIM repository 1300 according to the present disclosure. The eSIM repository 1300 may be implemented as an independent entity, or merged with other network entities (such as the eUICC device 1200, etc.). As shown, the eSIM repository 1300 generally includes a network interface 1302, a processor 1304, and a storage device 1306 for interfacing with a communication network.
在图1300例示的实施例中,eSIM仓库304能够:(i)对eSIM进行库存管理(如通过关联的元数据);(ii)对加密eSIM(如来自其他eSIM仓库和/或eUICC设备1200)的请求做出响应;(iii)管理用户对eSIM的请求。In the embodiment illustrated by diagram 1300, eSIM repository 304 is capable of: (i) inventorying eSIMs (eg, through associated metadata); (ii) encrypting eSIMs (eg, from other eSIM repositories and/or eUICC devices 1200) (iii) manage user requests for eSIM.
例如,当用户在eSIM仓库1300存储eSIM时,可以利用期望的目的地(如以方便传送到另一设备)存储eSIM或者可以不确定地停放。在任一种情况下,eSIM仓库能够向eUICC设备提供eSIM用于安全存储并用于针对目的地设备的后续加密。For example, when a user stores an eSIM at the eSIM vault 1300, the eSIM may be stored with a desired destination (eg, to facilitate transfer to another device) or may be parked indefinitely. In either case, the eSIM repository can provide the eSIM to the eUICC device for secure storage and for subsequent encryption to the destination device.
用户装置-user device-
现在参考图14,示出了根据本公开各方面的示例性用户装置1400。Referring now to FIG. 14 , an example user device 1400 is shown in accordance with aspects of the present disclosure.
图14的示例性UE装置是具有处理器子系统1402的无线设备,处理器子系统诸如是数字信号处理器、微处理器、现场可编程门阵列或安装于一个或多个基底上的多个处理部件。处理子系统还可包括内部高速缓存存储器。处理子系统与存储器子系统1404通信,存储器子系统包括存储器,存储器例如可以包括SRAM、闪存和/或SDRAM部件。存储器子系统可实现一个或多个DMA型硬件,以便促进本领域所熟知的数据访问。存储器子系统包含可以由处理器子系统执行的计算机可执行指令。The exemplary UE device of FIG. 14 is a wireless device having a processor subsystem 1402, such as a digital signal processor, microprocessor, field programmable gate array, or multiple Handling parts. The processing subsystem may also include internal cache memory. The processing subsystem is in communication with the memory subsystem 1404, which includes memory, which may include, for example, SRAM, flash memory, and/or SDRAM components. The memory subsystem may implement one or more DMA-type hardware to facilitate data access as is well known in the art. The memory subsystem contains computer-executable instructions that can be executed by the processor subsystem.
在一个示例性实施例中,设备包括一个或多个无线接口1406,适于连接到一个或多个无线网络。多个无线接口可以通过实施无线领域中公知类型的适当的天线和调制解调器子系统来支持不同的无线电技术,诸如GSM、CDMA、UMTS、LTE/LTE-A、WiMAX、WLAN、蓝牙等。In an exemplary embodiment, the device includes one or more wireless interfaces 1406 adapted to connect to one or more wireless networks. The multiple radio interfaces can support different radio technologies such as GSM, CDMA, UMTS, LTE/LTE-A, WiMAX, WLAN, Bluetooth, etc. by implementing appropriate antenna and modem subsystems of the type known in the wireless arts.
用户接口子系统1408包括任意数量的公知I/O,包括但不限于:小键盘、触摸屏(如多次触摸界面)、LCD显示器、背光、扬声器和/或麦克风。然而,应该认识到,在某些应用中,可排除这些部件的一者或多者。例如,PCMCIA卡型客户端实施例可缺少用户接口(因为它们可能背负在它们物理和/或电气耦合的主机设备的用户接口上)。User interface subsystem 1408 includes any number of well-known I/Os, including but not limited to: keypad, touch screen (eg, multi-touch interface), LCD display, backlight, speaker, and/or microphone. However, it should be appreciated that in some applications one or more of these components may be excluded. For example, PCMCIA card-type client embodiments may lack a user interface (as they may piggyback on the user interface of the host device to which they are physically and/or electrically coupled).
在图示的实施例中,设备包括安全元件1410,其包含并操作eUICC应用程序。EUICC能够存储并访问多个要用于认证网络运营商认证的访问控制客户端。安全元件包括安全处理器,其执行安全介质中存储的软件。安全介质对所有其他部件(除安全处理器之外)不可访问。此外,可以进一步强化示例性安全元件以防止如前所述的损害(如封入树脂中)。示例性安全元件1410能够接收并存储一个或多个访问控制客户端。在一个实施例中,安全元件存储与用户相关联的eSIM的阵列或多个eSIM(如一个用于工作、一个用于个人、几个用于漫游访问等),和/或根据另一种逻辑方案或关系(如一个用于家庭或企业实体多个成员的每个、一个用于家庭成员个人和工作使用的每个,等等)。每个eSIM都包括小的文件系统,包括计算机可读指令(eSIM程序)和关联数据(如加密密钥、完整性密钥等)。In the illustrated embodiment, the device includes a secure element 1410 that contains and operates an eUICC application. The EUICC is capable of storing and accessing multiple access control clients to be used to authenticate network operator authentication. The secure element includes a secure processor that executes software stored in the secure medium. The secure medium is inaccessible to all other components (except the secure processor). In addition, exemplary security elements may be further reinforced to prevent damage as previously described (eg, encased in resin). The example secure element 1410 is capable of receiving and storing one or more access control clients. In one embodiment, the secure element stores an array or multiple eSIMs (e.g., one for work, one for personal, several for roaming access, etc.) Scheme or relationship (such as one for each of multiple members of a household or business entity, one for each of household members' personal and work use, etc.). Each eSIM includes a small file system, including computer-readable instructions (eSIM program) and associated data (such as encryption keys, integrity keys, etc.).
安全元件还适于实现向和/或从移动设备传送eSIM。在一种具体实施中,移动设备提供基于GUI的确认以发起eSIM的传送。The secure element is also adapted to enable eSIM transfer to and/or from the mobile device. In one implementation, the mobile device provides a GUI-based confirmation to initiate the transfer of the eSIM.
一旦移动设备的用户选择激活eSIM,移动设备就向激活服务发送激活请求。移动设备能够使用eSIM进行标准认证和密钥协商(AKA)交换。Once the user of the mobile device chooses to activate the eSIM, the mobile device sends an activation request to the activation service. Mobile devices are able to use eSIM for standard authentication and key agreement (AKA) exchanges.
方法-method-
现在更详细地描述可结合上述方法使用的各种方法。Various methods that can be used in conjunction with the methods described above are now described in more detail.
图15示出了用于大规模分发电子访问控制客户端的方法的一个实施例。Figure 15 illustrates one embodiment of a method for mass distribution of electronic access control clients.
在步骤1502,第一设备建立一个或多个电子访问控制客户端的所有权。At step 1502, the first device establishes ownership of one or more electronic access control clients.
在步骤1504,第一设备确定一个或多个电子访问控制客户端是否先前未被复制过。At step 1504, the first device determines whether the one or more electronic access control clients have not been previously copied.
在步骤1506,第一设备对一个或多个电子访问控制客户端进行加密以传输到第二设备。At step 1506, the first device encrypts the one or more electronic access control clients for transmission to the second device.
在步骤1508,第一设备和第二设备交换或传输加密的一个或多个电子访问控制客户端。At step 1508, the first device and the second device exchange or transmit encrypted one or more electronic access control clients.
在给定本公开的情况下,本领域的普通技术人员将认识到用于大规模分发电子访问控制客户端的很多其他方案。Those of ordinary skill in the art, given the present disclosure, will recognize many other schemes for mass distribution of electronic access control clients.
应该认识到,当根据方法的特定步骤顺序来描述本公开的某些方面时,这些描述仅仅说明了本公开的更广泛的方法并且可由特定应用按需进行修改。在某些情况下,某些步骤可成为不必要的或可选的。此外,可将某些步骤或功能性添加至所公开的实施例,或者两个或多个步骤的性能的次序可加以排列。所有此类变型形式均视为涵盖在本文所公开和要求保护的本公开内。It should be appreciated that when certain aspects of the disclosure are described in terms of a particular sequence of steps of a method, these descriptions are merely illustrative of the broader method of the disclosure and may be modified as desired for a particular application. In some cases, certain steps may become unnecessary or optional. In addition, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps may be permuted. All such variations are deemed to be encompassed within the disclosure disclosed and claimed herein.
虽然上述具体实施方式已经示出、描述并指出施加到各种实施例的本公开的新颖特征,应当理解,本领域的技术人员在不脱离本公开的情况下在设备或过程的形式和细节中可做出各种省略、替代和改变前述描述是目前设想的实施本公开的最佳模式。本说明书绝不旨在进行限制,而是应被认为是本公开的一般原理的示例。应结合权利要求确定本公开的范围。While the foregoing detailed description has shown, described, and pointed out the novel features of the disclosure applied to various embodiments, it should be understood that one skilled in the art can vary in the form and detail of devices or processes without departing from the disclosure. Various omissions, substitutions and changes may be made from the foregoing description to be of the best mode presently contemplated for carrying out the present disclosure. This description is in no way intended to be limiting, but rather should be considered as an illustration of the general principles of the disclosure. The scope of the present disclosure should be determined in conjunction with the claims.
Claims (24)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710327698.1A CN107332817B (en) | 2012-02-14 | 2013-02-14 | Mobile device supporting multiple access control clients and corresponding method |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261598819P | 2012-02-14 | 2012-02-14 | |
US61/598,819 | 2012-02-14 | ||
US13/767,593 US9247424B2 (en) | 2012-02-14 | 2013-02-14 | Methods and apparatus for large scale distribution of electronic access clients |
US13/767,593 | 2013-02-14 | ||
PCT/US2013/026194 WO2013123233A2 (en) | 2012-02-14 | 2013-02-14 | Methods and apparatus for large scale distribution of electronic access clients |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710327698.1A Division CN107332817B (en) | 2012-02-14 | 2013-02-14 | Mobile device supporting multiple access control clients and corresponding method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104221347A true CN104221347A (en) | 2014-12-17 |
CN104221347B CN104221347B (en) | 2017-03-29 |
Family
ID=48045663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201380019098.9A Active CN104221347B (en) | 2012-02-14 | 2013-02-14 | Mobile device supporting multiple access control clients and corresponding method |
Country Status (8)
Country | Link |
---|---|
US (2) | US9247424B2 (en) |
JP (2) | JP2015512209A (en) |
KR (2) | KR101716743B1 (en) |
CN (1) | CN104221347B (en) |
BR (1) | BR112014019937A8 (en) |
MX (1) | MX342702B (en) |
RU (1) | RU2595904C2 (en) |
WO (1) | WO2013123233A2 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657818A (en) * | 2016-03-11 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Registration method and registration device for embedded type user identification module and mobile terminal |
CN105916134A (en) * | 2015-02-23 | 2016-08-31 | 苹果公司 | METHOD AND APPARATUS FOR SELECTING BOOTSTRAP Esims |
CN106470430A (en) * | 2015-08-14 | 2017-03-01 | 中兴通讯股份有限公司 | The processing method of operator's configuration, equipment and system |
TWI587674B (en) * | 2014-05-15 | 2017-06-11 | 蘋果公司 | Methods and apparatus to support globalplatform usage on an embedded uicc |
CN107534855A (en) * | 2015-04-17 | 2018-01-02 | 金雅拓股份有限公司 | The authority of remote control targeted security element and the method for right |
CN108229213A (en) * | 2016-12-15 | 2018-06-29 | 中国移动通信有限公司研究院 | Access control method, system and electronic equipment |
CN108880821A (en) * | 2018-06-28 | 2018-11-23 | 中国联合网络通信集团有限公司 | A kind of authentication method and equipment of digital certificate |
CN111480350A (en) * | 2017-12-18 | 2020-07-31 | 华为技术有限公司 | Method and equipment for data access of embedded SIM card |
CN112911580A (en) * | 2021-01-29 | 2021-06-04 | 陕西富莱尔软件科技有限公司 | eSIM configuration method and configuration system based on cloud service activation |
Families Citing this family (149)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060266157A1 (en) * | 2003-09-05 | 2006-11-30 | Dai Nippon Toryo Co., Ltd. | Metal fine particles, composition containing the same, and production method for producing metal fine particles |
EP2583174A1 (en) | 2010-06-18 | 2013-04-24 | Sweetlabs, Inc. | Systems and methods for integration of an application runtime environment into a user computing environment |
EP2461613A1 (en) * | 2010-12-06 | 2012-06-06 | Gemalto SA | Methods and system for handling UICC data |
TWI592051B (en) | 2012-02-07 | 2017-07-11 | 蘋果公司 | Network assisted fraud detection apparatus and methods |
US9231931B2 (en) * | 2012-05-23 | 2016-01-05 | Kt Corporation | Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card |
US8775925B2 (en) | 2012-08-28 | 2014-07-08 | Sweetlabs, Inc. | Systems and methods for hosted applications |
KR102067474B1 (en) | 2012-08-29 | 2020-02-24 | 삼성전자 주식회사 | Method for managing shared files and subscriber identidy apparatus embedded in user terminal using the method |
US9219732B2 (en) | 2012-12-28 | 2015-12-22 | Nok Nok Labs, Inc. | System and method for processing random challenges within an authentication framework |
US9306754B2 (en) | 2012-12-28 | 2016-04-05 | Nok Nok Labs, Inc. | System and method for implementing transaction signing within an authentication framework |
US9015482B2 (en) | 2012-12-28 | 2015-04-21 | Nok Nok Labs, Inc. | System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices |
US9172687B2 (en) * | 2012-12-28 | 2015-10-27 | Nok Nok Labs, Inc. | Query system and method to determine authentication capabilities |
US9083689B2 (en) | 2012-12-28 | 2015-07-14 | Nok Nok Labs, Inc. | System and method for implementing privacy classes within an authentication framework |
JP6101824B2 (en) | 2013-02-06 | 2017-03-22 | アップル インコーポレイテッド | Apparatus and method for secure element transaction and asset management |
FR3002398B1 (en) * | 2013-02-18 | 2015-04-03 | Oberthur Technologies | METHOD OF CREATING A PROFILE IN A SECURITY DOMAIN OF A SECURE ELEMENT |
US9584544B2 (en) * | 2013-03-12 | 2017-02-28 | Red Hat Israel, Ltd. | Secured logical component for security in a virtual environment |
US9780950B1 (en) * | 2013-03-15 | 2017-10-03 | Symantec Corporation | Authentication of PKI credential by use of a one time password and pin |
US9396320B2 (en) | 2013-03-22 | 2016-07-19 | Nok Nok Labs, Inc. | System and method for non-intrusive, privacy-preserving authentication |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
KR102133450B1 (en) | 2013-05-30 | 2020-07-13 | 삼성전자 주식회사 | Method and apparatus for setting profile |
US9294503B2 (en) | 2013-08-26 | 2016-03-22 | A10 Networks, Inc. | Health monitor based distributed denial of service attack mitigation |
US9100175B2 (en) | 2013-11-19 | 2015-08-04 | M2M And Iot Technologies, Llc | Embedded universal integrated circuit card supporting two-factor authentication |
US9350550B2 (en) | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
US10498530B2 (en) | 2013-09-27 | 2019-12-03 | Network-1 Technologies, Inc. | Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys |
US10700856B2 (en) * | 2013-11-19 | 2020-06-30 | Network-1 Technologies, Inc. | Key derivation for a module using an embedded universal integrated circuit card |
US9763081B2 (en) * | 2013-11-21 | 2017-09-12 | Apple Inc. | System and method for policy control functions management mechanism |
CN106851628B (en) | 2013-12-05 | 2020-08-07 | 华为终端有限公司 | Method and device for downloading files of operator |
US9749440B2 (en) | 2013-12-31 | 2017-08-29 | Sweetlabs, Inc. | Systems and methods for hosted application marketplaces |
US10263903B2 (en) | 2014-02-05 | 2019-04-16 | Ibasis, Inc. | Method and apparatus for managing communication flow in an inter-network system |
WO2015126136A1 (en) * | 2014-02-21 | 2015-08-27 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating client credentials |
US9635014B2 (en) | 2014-02-21 | 2017-04-25 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating client credentials |
US10263980B2 (en) * | 2014-03-06 | 2019-04-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Network node, device and methods for providing an authentication module |
US9542558B2 (en) * | 2014-03-12 | 2017-01-10 | Apple Inc. | Secure factory data generation and restoration |
US9510186B2 (en) * | 2014-04-04 | 2016-11-29 | Apple Inc. | Tamper prevention for electronic subscriber identity module (eSIM) type parameters |
DE102014005566A1 (en) | 2014-04-16 | 2015-10-22 | Giesecke & Devrient Gmbh | Method and device for operating a mobile terminal in a mobile radio network |
KR102200209B1 (en) * | 2014-04-22 | 2021-01-08 | 삼성전자 주식회사 | Method and apparatus for provisioning profiles |
US20150312228A1 (en) * | 2014-04-29 | 2015-10-29 | Qualcomm Incorporated | Remote station for deriving a derivative key in a system-on-a-chip device |
US9577999B1 (en) | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US10089098B2 (en) * | 2014-05-15 | 2018-10-02 | Sweetlabs, Inc. | Systems and methods for application installation platforms |
US10019247B2 (en) | 2014-05-15 | 2018-07-10 | Sweetlabs, Inc. | Systems and methods for application installation platforms |
CN105637498B (en) * | 2014-05-23 | 2019-05-28 | 华为技术有限公司 | Management method of eUICC, eUICC, SM platform and system |
US9730072B2 (en) * | 2014-05-23 | 2017-08-08 | Apple Inc. | Electronic subscriber identity module provisioning |
US9439062B2 (en) | 2014-05-30 | 2016-09-06 | Apple Inc. | Electronic subscriber identity module application identifier handling |
US9451445B2 (en) * | 2014-05-30 | 2016-09-20 | Apple Inc. | Electronic subscriber identity module selection |
DE102015209400B4 (en) * | 2014-05-30 | 2022-05-12 | Apple Inc. | Handling of application identifiers of electronic subscriber identity modules |
WO2015184064A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Secure storage of an electronic subscriber identity module on a wireless communication device |
DE102014008268A1 (en) * | 2014-06-06 | 2015-12-17 | Giesecke & Devrient Gmbh | Methods and apparatus for managing subscription profiles on a security element |
CN106465107B (en) | 2014-07-07 | 2020-12-01 | 华为技术有限公司 | Authorization method and device for embedded universal integrated circuit card management |
KR102160597B1 (en) * | 2014-07-17 | 2020-09-28 | 삼성전자 주식회사 | Method and apparatus for provisioning profile of embedded universal integrated circuit card |
KR102191017B1 (en) * | 2014-07-19 | 2020-12-15 | 삼성전자주식회사 | Method and server device for provisioning an embedded SIM |
US9749131B2 (en) | 2014-07-31 | 2017-08-29 | Nok Nok Labs, Inc. | System and method for implementing a one-time-password using asymmetric cryptography |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US10270811B2 (en) | 2014-08-13 | 2019-04-23 | Huawei Technologies Co., Ltd. | Security domain management method, apparatus, and system |
KR102311027B1 (en) | 2014-08-14 | 2021-10-08 | 삼성전자 주식회사 | A method and apparatus for profile downloading of group devices |
US9736154B2 (en) | 2014-09-16 | 2017-08-15 | Nok Nok Labs, Inc. | System and method for integrating an authentication service within a network architecture |
US9756071B1 (en) | 2014-09-16 | 2017-09-05 | A10 Networks, Inc. | DNS denial of service attack protection |
US10255429B2 (en) | 2014-10-03 | 2019-04-09 | Wells Fargo Bank, N.A. | Setting an authorization level at enrollment |
US9537886B1 (en) | 2014-10-23 | 2017-01-03 | A10 Networks, Inc. | Flagging security threats in web service requests |
US10743181B1 (en) * | 2014-12-23 | 2020-08-11 | Wells Fargo Bank, N.A. | System for binding multiple sim cards to an electronic device |
US9520911B2 (en) * | 2014-12-23 | 2016-12-13 | Wellsfargo Bank, N.A. | System for binding multiple SIM cards to an electronic device |
WO2016108096A1 (en) * | 2014-12-30 | 2016-07-07 | Stmicroelectronics S.R.L. | Methods for providing a response to a scp80 command requesting the execution of a proactive command, related universal integrated circuit card, mobile device, server and computer program product |
US9584318B1 (en) | 2014-12-30 | 2017-02-28 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack defense |
US9900343B1 (en) | 2015-01-05 | 2018-02-20 | A10 Networks, Inc. | Distributed denial of service cellular signaling |
US9853977B1 (en) | 2015-01-26 | 2017-12-26 | Winklevoss Ip, Llc | System, method, and program product for processing secure transactions within a cloud computing system |
US10555163B2 (en) * | 2015-01-27 | 2020-02-04 | Nokia Solutions And Networks Oy | Handling of certificates for embedded universal integrated circuit cards |
US9848013B1 (en) * | 2015-02-05 | 2017-12-19 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack detection |
US10063591B1 (en) | 2015-02-14 | 2018-08-28 | A10 Networks, Inc. | Implementing and optimizing secure socket layer intercept |
KR102333395B1 (en) * | 2015-02-17 | 2021-12-03 | 삼성전자 주식회사 | Method and apparatus for receiving profile information at a terminal in a wireless communication system |
US10785645B2 (en) * | 2015-02-23 | 2020-09-22 | Apple Inc. | Techniques for dynamically supporting different authentication algorithms |
JP6799541B2 (en) | 2015-03-22 | 2020-12-16 | アップル インコーポレイテッドApple Inc. | Methods and devices for user authentication and human intent verification in mobile devices |
US10939279B2 (en) | 2015-03-25 | 2021-03-02 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading profile in wireless communication system |
DE102015003977A1 (en) * | 2015-03-26 | 2016-09-29 | Giesecke & Devrient Gmbh | Method for loading a profile |
WO2016167551A1 (en) * | 2015-04-13 | 2016-10-20 | 삼성전자 주식회사 | Technique for managing profile in communication system |
US9760728B2 (en) | 2015-04-22 | 2017-09-12 | Gemalto Sa | System and method for managing logical channels for accessing several virtual profiles in a secure element |
EP4037357B1 (en) * | 2015-05-18 | 2023-08-09 | Apple Inc. | Pre-personalization of esims to support large-scale esim delivery |
EP3941101A1 (en) | 2015-05-22 | 2022-01-19 | Huawei Device Co., Ltd. | Cryptographic unit for public key infrastructure (pki) operations |
US9526009B1 (en) | 2015-05-29 | 2016-12-20 | Qualcomm Incorporated | Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card |
ES2786261T3 (en) * | 2015-06-09 | 2020-10-09 | Deutsche Telekom Ag | Method for an improved installation of a service application related to a secure item on a secure item found in a communication device, system and telecommunications network for an improved installation of a service application related to a secure item on an item secure found on a communication device, program that includes computer-readable program code, and computer program product |
US10003974B2 (en) | 2015-06-19 | 2018-06-19 | Apple Inc. | Electronic subscriber identity module management under multiple certificate authorities |
DE102015008117A1 (en) * | 2015-06-23 | 2016-12-29 | Giesecke & Devrient Gmbh | subscription management |
US9686081B2 (en) * | 2015-07-01 | 2017-06-20 | Cisco Technology, Inc. | Detecting compromised certificate authority |
US10694023B2 (en) * | 2015-07-10 | 2020-06-23 | Rohde & Schwarz Gmbh & Co. Kg | Testing methods and systems for mobile communication devices |
WO2017041306A1 (en) * | 2015-09-11 | 2017-03-16 | 华为技术有限公司 | Profile processing method, profile processing apparatus, user terminal and euicc |
US10277587B2 (en) * | 2015-10-08 | 2019-04-30 | Apple Inc. | Instantiation of multiple electronic subscriber identity module (eSIM) instances |
WO2017082697A1 (en) * | 2015-11-13 | 2017-05-18 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading profile on embedded universal integrated circuit card of terminal |
US10356614B2 (en) | 2015-11-20 | 2019-07-16 | Apple Inc. | Secure electronic subscriber identity module (eSIM) restoration |
CN105516962B (en) * | 2015-12-03 | 2019-03-05 | 中国联合网络通信集团有限公司 | Account-opening method and system based on eUICC |
EP3176695A1 (en) * | 2015-12-04 | 2017-06-07 | Gemalto Sa | Method for managing a package in a secure element |
US10469594B2 (en) | 2015-12-08 | 2019-11-05 | A10 Networks, Inc. | Implementation of secure socket layer intercept |
US10505984B2 (en) | 2015-12-08 | 2019-12-10 | A10 Networks, Inc. | Exchange of control information between secure socket layer gateways |
KR102490497B1 (en) * | 2015-12-28 | 2023-01-19 | 삼성전자주식회사 | Method and apparatus for receiving/transmitting profile in communication system |
US10630490B2 (en) | 2016-02-26 | 2020-04-21 | Apple Inc. | Obtaining and using time information on a secure element (SE) |
US10523447B2 (en) | 2016-02-26 | 2019-12-31 | Apple Inc. | Obtaining and using time information on a secure element (SE) |
US10680833B2 (en) | 2016-02-26 | 2020-06-09 | Apple Inc. | Obtaining and using time information on a secure element (SE) |
KR102468974B1 (en) | 2016-03-21 | 2022-11-22 | 삼성전자주식회사 | Method and apparatus for controlling electronic device |
US10848320B2 (en) | 2016-03-25 | 2020-11-24 | Apple Inc. | Device-assisted verification |
US10021558B2 (en) * | 2016-03-29 | 2018-07-10 | Qualcomm Incorporated | System and methods for using embedded subscriber identity module (eSIM) provisioning processes to provide and activate device configuration packages on a wireless communication device |
US10863558B2 (en) * | 2016-03-30 | 2020-12-08 | Schweitzer Engineering Laboratories, Inc. | Communication device for implementing trusted relationships in a software defined network |
US11076295B2 (en) * | 2016-04-12 | 2021-07-27 | Huawei Technologies Co., Ltd. | Remote management method, and device |
US10764066B2 (en) * | 2016-05-18 | 2020-09-01 | Apple Inc. | EUICC secure timing and certificate revocation |
US10574465B2 (en) * | 2016-05-18 | 2020-02-25 | Apple Inc. | Electronic subscriber identity module (eSIM) eligibility checking |
US9900765B2 (en) | 2016-06-02 | 2018-02-20 | Apple Inc. | Method and apparatus for creating and using a roaming list based on a user roaming plan |
US10116634B2 (en) | 2016-06-28 | 2018-10-30 | A10 Networks, Inc. | Intercepting secure session upon receipt of untrusted certificate |
US10158666B2 (en) | 2016-07-26 | 2018-12-18 | A10 Networks, Inc. | Mitigating TCP SYN DDoS attacks using TCP reset |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10979890B2 (en) | 2016-09-09 | 2021-04-13 | Ibasis, Inc. | Policy control framework |
US10506439B2 (en) * | 2016-09-16 | 2019-12-10 | Apple Inc. | Secure control of profile policy rules |
FR3056788A1 (en) * | 2016-09-29 | 2018-03-30 | Orange | MANAGING A MULTI-SIM OFFER WITH MULTIPLE ACTIVATION CODES |
FR3056781A1 (en) * | 2016-09-29 | 2018-03-30 | Orange | ASSIGNING PROFILES TO A PLURALITY OF TERMINALS WITH IMPLANTED SIM CARDS |
KR20190058584A (en) * | 2016-10-04 | 2019-05-29 | 닛본 덴끼 가부시끼가이샤 | Embedded SIM management system, node device, embedded SIM management method, program, and information registrant device |
US9992607B2 (en) | 2016-10-07 | 2018-06-05 | Microsoft Technology Licensing, Llc | eSIM identification data |
EP3324655A1 (en) * | 2016-11-17 | 2018-05-23 | Gemalto SA | Method for managing a patch of a sofware component in a euicc |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
EP3603141B1 (en) | 2017-03-30 | 2021-02-17 | iBasis, Inc. | Esim profile switching without sms |
US10334427B2 (en) * | 2017-04-07 | 2019-06-25 | Apple Inc. | In-advance eSIM management notification |
EP3416086A1 (en) * | 2017-06-15 | 2018-12-19 | Gemalto Sa | Method for managing an instance of a class |
US10524116B2 (en) | 2017-06-27 | 2019-12-31 | Ibasis, Inc. | Internet of things services architecture |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11432124B2 (en) | 2018-08-31 | 2022-08-30 | At&T Intellectual Property I, L.P. | Storing tracking area identities onto a universal integrated circuit card in advanced networks |
US10516978B1 (en) | 2018-08-31 | 2019-12-24 | At&T Intellectual Property I, L.P. | Network based carrier managed long-term evolution advanced device indication for long-term evolution or other next generation network |
CN109246687A (en) * | 2018-09-27 | 2019-01-18 | 努比亚技术有限公司 | ESIM test method, mobile terminal, system and readable storage medium storing program for executing |
US10911945B1 (en) * | 2018-11-19 | 2021-02-02 | Sprint Spectrum L.P. | Automated eUICC service profile configuration in view of operational issue with respect to eUICC service profile |
JP6499367B1 (en) * | 2018-12-14 | 2019-04-10 | 日本通信株式会社 | Online service provision system |
JP6499368B1 (en) * | 2018-12-14 | 2019-04-10 | 日本通信株式会社 | Online service provision system |
US12041039B2 (en) | 2019-02-28 | 2024-07-16 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
KR102208142B1 (en) * | 2019-07-30 | 2021-01-27 | 시큐리티플랫폼 주식회사 | Method and system for issuing and using device certificate based on distributed code |
US12149921B2 (en) | 2019-08-01 | 2024-11-19 | Huawei Technologies Co., Ltd. | Operator network switching method and electronic device |
US10645076B1 (en) | 2019-08-07 | 2020-05-05 | Capital One Services, Llc | Automatic identity management with third party service providers |
US12101630B2 (en) | 2019-08-18 | 2024-09-24 | Apple Inc. | Mobile device authentication without electronic subscriber identity module (eSIM) credentials |
US11272336B2 (en) * | 2019-09-12 | 2022-03-08 | Amdocs Development Limited | System, method, and computer program for transferring subscriber identity module (SIM) information for SIM card or eSIM activation |
KR102224094B1 (en) | 2019-10-28 | 2021-03-08 | 주식회사 서연이화 | Tether anchor assembly for child seat fixture |
US11516003B2 (en) * | 2020-04-03 | 2022-11-29 | Apple Inc. | Electronic subscriber identity module transfer credential wrapping |
JP2022023707A (en) * | 2020-07-27 | 2022-02-08 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | SIM, communication device, and application writing method |
CN112770314B (en) | 2020-12-03 | 2024-04-09 | 上海途鸽数据科技有限公司 | Method and device for establishing communication connection |
US12289795B2 (en) * | 2021-04-01 | 2025-04-29 | Pismo Labs Technology Limited | Establishing and maintaining cellular data communication using remote subscriber identification module profile |
US12127305B2 (en) | 2021-05-10 | 2024-10-22 | Apple Inc. | Off-line profile provisioning for wireless devices |
US11336564B1 (en) | 2021-09-01 | 2022-05-17 | Schweitzer Engineering Laboratories, Inc. | Detection of active hosts using parallel redundancy protocol in software defined networks |
US11750502B2 (en) | 2021-09-01 | 2023-09-05 | Schweitzer Engineering Laboratories, Inc. | Detection of in-band software defined network controllers using parallel redundancy protocol |
US12126613B2 (en) | 2021-09-17 | 2024-10-22 | Nok Nok Labs, Inc. | System and method for pre-registration of FIDO authenticators |
WO2023091613A1 (en) * | 2021-11-17 | 2023-05-25 | X70.Io Ltd. | Method for securing security token and smartcard into processing device, and system, terminal and computer-readable medium for the same |
US12149941B2 (en) | 2022-05-09 | 2024-11-19 | T-Mobile Usa, Inc. | Cross-carrier digital ledger for subscriber identification module (SIM) related data |
US12284524B2 (en) * | 2022-06-09 | 2025-04-22 | Apple Inc. | Secure eSIM subscription transfer |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100153713A1 (en) * | 2008-12-15 | 2010-06-17 | Sap Ag | Systems and methods for detecting exposure of private keys |
CN101909295A (en) * | 2009-06-05 | 2010-12-08 | 联发科技股份有限公司 | System and associated method for providing a remote subscriber identity card to a mobile station |
WO2010144479A2 (en) * | 2009-06-08 | 2010-12-16 | Qualcomm Incorporated | Virtual sim card for mobile devices |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
FR2849230B1 (en) * | 2002-12-24 | 2005-04-22 | Francois Bangui | METHOD AND APPARATUS FOR VERIFYING THE INTEGRITY OF A SOFTWARE APPLICATION WITHOUT AN ENCRYPTION / DECRYMENT KEY |
US20040230965A1 (en) | 2003-02-28 | 2004-11-18 | Harri Okkonen | Mobile handset network that facilitates interaction between a generic intelligent responsive agent and a service broker server |
US7139781B2 (en) * | 2003-04-29 | 2006-11-21 | International Business Machines Corporation | Managing filesystem versions |
CA2566801A1 (en) * | 2004-07-14 | 2006-01-19 | Matsushita Electric Industrial Co., Ltd. | Method for authenticating and executing an application program |
US7929703B2 (en) * | 2005-12-28 | 2011-04-19 | Alcatel-Lucent Usa Inc. | Methods and system for managing security keys within a wireless network |
KR100764153B1 (en) | 2006-03-15 | 2007-10-12 | 포스데이타 주식회사 | Method and apparatus for detecting terminal duplication in portable internet system |
KR20080013581A (en) | 2006-08-09 | 2008-02-13 | 삼성전자주식회사 | Station capable of collecting information for security and information collection method for security |
US7908292B2 (en) | 2006-12-05 | 2011-03-15 | Nokia Corporation | Metadata broker |
EP2102783A4 (en) * | 2007-01-16 | 2016-06-08 | Ericsson Telefon Ab L M | Control device, reproducing device, permission server, method for controlling control device, method for controlling reproducing device, and method for controlling permission server |
WO2008088923A1 (en) | 2007-01-19 | 2008-07-24 | Taproot Systems, Inc. | Point of presence on a mobile network |
US9112909B2 (en) | 2008-02-13 | 2015-08-18 | Futurewei Technologies, Inc. | User and device authentication in broadband networks |
US8924714B2 (en) * | 2008-06-27 | 2014-12-30 | Microsoft Corporation | Authentication with an untrusted root |
JP4844613B2 (en) | 2008-09-30 | 2011-12-28 | ブラザー工業株式会社 | Wireless network connection method, wireless communication apparatus, and program |
ES2401358T3 (en) * | 2008-10-13 | 2013-04-18 | Vodafone Holding Gmbh | Procedure and terminal to provide controlled access to a memory card |
EP2197167B1 (en) * | 2008-12-12 | 2017-07-12 | Vodafone Holding GmbH | Device and method for short range communication |
US9736675B2 (en) | 2009-05-12 | 2017-08-15 | Avaya Inc. | Virtual machine implementation of multiple use context executing on a communication device |
CN101562814A (en) * | 2009-05-15 | 2009-10-21 | 中兴通讯股份有限公司 | Access method and system for a third-generation network |
US20110314388A1 (en) | 2010-06-18 | 2011-12-22 | Nokia Corporation | Method and apparatus for generating a collaborative playlist |
CA2745975C (en) * | 2010-07-09 | 2016-02-23 | Research In Motion Limited | Utilization of a microcode interpreter built in to a processor |
US8924715B2 (en) * | 2010-10-28 | 2014-12-30 | Stephan V. Schell | Methods and apparatus for storage and execution of access control clients |
US9100393B2 (en) * | 2010-11-04 | 2015-08-04 | Apple Inc. | Simulacrum of physical security device and methods |
US8627422B2 (en) * | 2010-11-06 | 2014-01-07 | Qualcomm Incorporated | Authentication in secure user plane location (SUPL) systems |
CN101986767B (en) * | 2010-11-12 | 2014-04-09 | 中兴通讯股份有限公司 | Double network and double standby terminal, power-on method thereof and power-off method thereof |
WO2012068094A1 (en) * | 2010-11-15 | 2012-05-24 | Interdigital Patent Holdings, Inc. | Certificate validation and channel binding |
US8621168B2 (en) * | 2010-12-17 | 2013-12-31 | Google Inc. | Partitioning the namespace of a contactless smart card |
US8707022B2 (en) * | 2011-04-05 | 2014-04-22 | Apple Inc. | Apparatus and methods for distributing and storing electronic access clients |
ES2558008T3 (en) * | 2011-05-06 | 2016-02-01 | Nokia Technologies Oy | Determination of device configuration and programming data |
US8898459B2 (en) * | 2011-08-31 | 2014-11-25 | At&T Intellectual Property I, L.P. | Policy configuration for mobile device applications |
EP2587715B1 (en) * | 2011-09-20 | 2017-01-04 | BlackBerry Limited | Assisted certificate enrollment |
KR20140086950A (en) * | 2011-09-28 | 2014-07-08 | 주식회사 케이티 | Profile management method, embedded uicc, and device provided with the embedded uicc |
-
2013
- 2013-02-14 KR KR1020167011363A patent/KR101716743B1/en active Active
- 2013-02-14 WO PCT/US2013/026194 patent/WO2013123233A2/en active Application Filing
- 2013-02-14 KR KR1020147025521A patent/KR101618274B1/en active Active
- 2013-02-14 JP JP2014557779A patent/JP2015512209A/en active Pending
- 2013-02-14 RU RU2014137130/08A patent/RU2595904C2/en active
- 2013-02-14 MX MX2014009822A patent/MX342702B/en active IP Right Grant
- 2013-02-14 US US13/767,593 patent/US9247424B2/en active Active
- 2013-02-14 BR BR112014019937A patent/BR112014019937A8/en not_active Application Discontinuation
- 2013-02-14 CN CN201380019098.9A patent/CN104221347B/en active Active
-
2016
- 2016-01-13 US US14/995,154 patent/US9843585B2/en active Active
- 2016-10-11 JP JP2016200282A patent/JP6533203B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100153713A1 (en) * | 2008-12-15 | 2010-06-17 | Sap Ag | Systems and methods for detecting exposure of private keys |
CN101909295A (en) * | 2009-06-05 | 2010-12-08 | 联发科技股份有限公司 | System and associated method for providing a remote subscriber identity card to a mobile station |
WO2010144479A2 (en) * | 2009-06-08 | 2010-12-16 | Qualcomm Incorporated | Virtual sim card for mobile devices |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10015165B2 (en) | 2014-05-15 | 2018-07-03 | Apple Inc. | Methods and apparatus to support GlobalPlatform™ usage on an embedded UICC (eUICC) |
TWI587674B (en) * | 2014-05-15 | 2017-06-11 | 蘋果公司 | Methods and apparatus to support globalplatform usage on an embedded uicc |
CN105916134A (en) * | 2015-02-23 | 2016-08-31 | 苹果公司 | METHOD AND APPARATUS FOR SELECTING BOOTSTRAP Esims |
CN105916134B (en) * | 2015-02-23 | 2019-05-28 | 苹果公司 | Method and apparatus for selecting guidance eSIM |
CN107534855A (en) * | 2015-04-17 | 2018-01-02 | 金雅拓股份有限公司 | The authority of remote control targeted security element and the method for right |
CN106470430A (en) * | 2015-08-14 | 2017-03-01 | 中兴通讯股份有限公司 | The processing method of operator's configuration, equipment and system |
CN105657818B (en) * | 2016-03-11 | 2019-04-12 | 宇龙计算机通信科技(深圳)有限公司 | Register method, register device and the mobile terminal of embedded user identification module |
CN105657818A (en) * | 2016-03-11 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Registration method and registration device for embedded type user identification module and mobile terminal |
CN108229213A (en) * | 2016-12-15 | 2018-06-29 | 中国移动通信有限公司研究院 | Access control method, system and electronic equipment |
CN108229213B (en) * | 2016-12-15 | 2020-07-07 | 中国移动通信有限公司研究院 | Access control method, system and electronic device |
CN111480350A (en) * | 2017-12-18 | 2020-07-31 | 华为技术有限公司 | Method and equipment for data access of embedded SIM card |
CN111480350B (en) * | 2017-12-18 | 2022-02-01 | 华为技术有限公司 | Method and equipment for data access of embedded SIM card |
CN108880821A (en) * | 2018-06-28 | 2018-11-23 | 中国联合网络通信集团有限公司 | A kind of authentication method and equipment of digital certificate |
CN108880821B (en) * | 2018-06-28 | 2021-07-13 | 中国联合网络通信集团有限公司 | A digital certificate authentication method and device |
CN112911580A (en) * | 2021-01-29 | 2021-06-04 | 陕西富莱尔软件科技有限公司 | eSIM configuration method and configuration system based on cloud service activation |
CN112911580B (en) * | 2021-01-29 | 2023-11-07 | 陕西富莱尔软件科技有限公司 | eSIM configuration method and system based on cloud service activation |
Also Published As
Publication number | Publication date |
---|---|
MX2014009822A (en) | 2014-09-11 |
KR101716743B1 (en) | 2017-03-15 |
US9843585B2 (en) | 2017-12-12 |
MX342702B (en) | 2016-10-10 |
KR20160052803A (en) | 2016-05-12 |
RU2014137130A (en) | 2016-04-10 |
BR112014019937A2 (en) | 2017-06-20 |
RU2595904C2 (en) | 2016-08-27 |
JP6533203B2 (en) | 2019-06-19 |
US20130227646A1 (en) | 2013-08-29 |
US9247424B2 (en) | 2016-01-26 |
CN104221347B (en) | 2017-03-29 |
KR20140129161A (en) | 2014-11-06 |
BR112014019937A8 (en) | 2017-07-11 |
US20160226877A1 (en) | 2016-08-04 |
WO2013123233A3 (en) | 2013-10-24 |
KR101618274B1 (en) | 2016-05-04 |
WO2013123233A2 (en) | 2013-08-22 |
JP2017050875A (en) | 2017-03-09 |
JP2015512209A (en) | 2015-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104221347B (en) | Mobile device supporting multiple access control clients and corresponding method | |
JP6262278B2 (en) | Method and apparatus for storage and computation of access control client | |
US9788209B2 (en) | Apparatus and methods for controlling distribution of electronic access clients | |
CN107332817B (en) | Mobile device supporting multiple access control clients and corresponding method | |
KR101611773B1 (en) | Methods, apparatuses and computer program products for identity management in a multi-network system | |
TWI469654B (en) | Methods and apparatus for delivering electronic identification components over a wireless network | |
US11910194B2 (en) | Secondary device authentication proxied from authenticated primary device | |
KR20140107168A (en) | Apparatus and methods for storing electronic access clients |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |